Skip to content

Commit 35a300f

Browse files
owen-mcmbg
andcommitted
Apply suggestions from code review
Co-authored-by: Michael B. Gale <[email protected]>
1 parent b7dfa23 commit 35a300f

File tree

7 files changed

+11
-11
lines changed

7 files changed

+11
-11
lines changed

go/ql/lib/semmle/go/security/IncorrectIntegerConversionLib.qll

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -258,9 +258,8 @@ private module ConversionWithoutBoundsCheckConfig implements DataFlow::StateConf
258258
}
259259

260260
/**
261-
* Tracks taint flow from an integer obtained from parsing a string flows to a
262-
* type conversion to a smaller integer type, which could cause unexpected
263-
* values.
261+
* Tracks taint flow from an integer obtained from parsing a string that flows
262+
* to a type conversion to a smaller integer type, which could cause data loss.
264263
*/
265264
module Flow = TaintTracking::GlobalWithState<ConversionWithoutBoundsCheckConfig>;
266265

go/ql/lib/semmle/go/security/InsecureRandomness.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,8 @@ module InsecureRandomness {
4747
}
4848

4949
/**
50-
* Tracks taint flow for reasoning about random values that are not
51-
* cryptographically secure.
50+
* Tracks taint flow from randomly generated values which are not
51+
* cryptographically secure to cryptographic applications.
5252
*/
5353
module Flow = TaintTracking::Global<Config>;
5454
}

go/ql/lib/semmle/go/security/OpenUrlRedirect.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,6 @@ module OpenUrlRedirect {
104104
}
105105
}
106106

107-
/** Tracks taint flow for reasoning about unvalidated URL redirections. */
107+
/** Tracks taint flow from unvalidated, untrusted data to URL redirections. */
108108
module Flow = DataFlow::Global<Config>;
109109
}

go/ql/lib/semmle/go/security/ReflectedXss.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,6 @@ module ReflectedXss {
4646
predicate isBarrier(DataFlow::Node node) { node instanceof Sanitizer }
4747
}
4848

49-
/** Tracks taint flow for reasoning about XSS. */
49+
/** Tracks taint flow from untrusted data to XSS attack vectors. */
5050
module Flow = TaintTracking::Global<Config>;
5151
}

go/ql/lib/semmle/go/security/RequestForgery.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,6 @@ module RequestForgery {
6767
}
6868
}
6969

70-
/** Tracks taint flow for reasoning about request forgery. */
70+
/** Tracks taint flow from untrusted data to request forgery attack vectors. */
7171
module Flow = TaintTracking::Global<Config>;
7272
}

go/ql/lib/semmle/go/security/StringBreak.qll

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,8 +50,9 @@ module StringBreak {
5050
}
5151

5252
/**
53-
* Tracks taint flow for reasoning about unsafe-quoting vulnerabilities,
54-
* parameterized with the type of quote being tracked.
53+
* Tracks taint flow from untrusted data which may contain single or double
54+
* quotes to uses where those quotes need to be escaped. The type of quote
55+
* is accessible through the `Sink`.
5556
*/
5657
module Flow = TaintTracking::GlobalWithState<Config>;
5758
}

go/ql/lib/semmle/go/security/UnsafeUnzipSymlink.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ module UnsafeUnzipSymlink {
1414
import UnsafeUnzipSymlinkCustomizations::UnsafeUnzipSymlink
1515

1616
/**
17-
* DEPRECATED: Use a copy of `EvalSymlinksConfig` and `EvalSymlinksFlow` instead.
17+
* DEPRECATED: Use copies of `EvalSymlinksConfig` and `EvalSymlinksFlow` instead.
1818
*
1919
* A taint-flow configuration tracking archive header fields flowing to a `path/filepath.EvalSymlinks` call.
2020
*/

0 commit comments

Comments
 (0)