We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 9fba7d3 commit 40635e6Copy full SHA for 40635e6
javascript/ql/src/Security/CWE-094/ExpressionInjection.qhelp
@@ -35,15 +35,9 @@
35
</p>
36
<sample src="examples/comment_issue_bad.yml" />
37
38
- <p>
39
- The following example uses shell syntax to read
40
- the environment variable and will prevent the attack:
41
- </p>
42
- <sample src="examples/comment_issue_good.yml" />
43
-
44
<p>
45
The following example uses an environment variable, but
46
- still allows injection because of the use of expression syntax:
+ <b>still allows the injection</b> because of the use of expression syntax:
47
48
<sample src="examples/comment_issue_bad_env.yml" />
49
0 commit comments