Skip to content

Commit 40635e6

Browse files
committed
Improve documentation
1 parent 9fba7d3 commit 40635e6

File tree

1 file changed

+1
-7
lines changed

1 file changed

+1
-7
lines changed

javascript/ql/src/Security/CWE-094/ExpressionInjection.qhelp

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -35,15 +35,9 @@
3535
</p>
3636
<sample src="examples/comment_issue_bad.yml" />
3737

38-
<p>
39-
The following example uses shell syntax to read
40-
the environment variable and will prevent the attack:
41-
</p>
42-
<sample src="examples/comment_issue_good.yml" />
43-
4438
<p>
4539
The following example uses an environment variable, but
46-
still allows injection because of the use of expression syntax:
40+
<b>still allows the injection</b> because of the use of expression syntax:
4741
</p>
4842
<sample src="examples/comment_issue_bad_env.yml" />
4943

0 commit comments

Comments
 (0)