Skip to content

Commit 98538d2

Browse files
committed
Python: Autoformat
1 parent 5ba8e10 commit 98538d2

File tree

7 files changed

+12
-12
lines changed

7 files changed

+12
-12
lines changed

python/ql/src/experimental/Security/CWE-176/UnicodeBypassValidationQuery.qll

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,7 @@ private module UnicodeBypassValidationConfig implements DataFlow::StateConfigSig
3636
}
3737

3838
predicate isAdditionalFlowStep(
39-
DataFlow::Node nodeFrom, FlowState stateFrom, DataFlow::Node nodeTo,
40-
FlowState stateTo
39+
DataFlow::Node nodeFrom, FlowState stateFrom, DataFlow::Node nodeTo, FlowState stateTo
4140
) {
4241
(
4342
exists(Escaping escaping | nodeFrom = escaping.getAnInput() and nodeTo = escaping.getOutput())

python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstHash/PossibleTimingAttackAgainstHash.ql

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,9 @@ module PossibleTimingAttackAgainstHashFlow = TaintTracking::Global<PossibleTimin
3232

3333
import PossibleTimingAttackAgainstHashFlow::PathGraph
3434

35-
from PossibleTimingAttackAgainstHashFlow::PathNode source, PossibleTimingAttackAgainstHashFlow::PathNode sink
35+
from
36+
PossibleTimingAttackAgainstHashFlow::PathNode source,
37+
PossibleTimingAttackAgainstHashFlow::PathNode sink
3638
where PossibleTimingAttackAgainstHashFlow::flowPath(source, sink)
3739
select sink.getNode(), source, sink, "Possible Timing attack against $@ validation.",
3840
source.getNode().(ProduceCryptoCall).getResultType(), "message"

python/ql/src/experimental/Security/CWE-208/TimingAttackAgainstSensitiveInfo/PossibleTimingAttackAgainstSensitiveInfo.ql

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,13 @@ private module PossibleTimingAttackAgainstSensitiveInfoConfig implements DataFlo
2626
}
2727

2828
module PossibleTimingAttackAgainstSensitiveInfoFlow =
29-
TaintTracking::Global<PossibleTimingAttackAgainstSensitiveInfoConfig>;
29+
TaintTracking::Global<PossibleTimingAttackAgainstSensitiveInfoConfig>;
3030

3131
import PossibleTimingAttackAgainstSensitiveInfoFlow::PathGraph
3232

33-
from PossibleTimingAttackAgainstSensitiveInfoFlow::PathNode source, PossibleTimingAttackAgainstSensitiveInfoFlow::PathNode sink
33+
from
34+
PossibleTimingAttackAgainstSensitiveInfoFlow::PathNode source,
35+
PossibleTimingAttackAgainstSensitiveInfoFlow::PathNode sink
3436
where PossibleTimingAttackAgainstSensitiveInfoFlow::flowPath(source, sink)
3537
select sink.getNode(), source, sink, "Timing attack against $@ validation.", source.getNode(),
3638
"client-supplied token"

python/ql/src/experimental/Security/CWE-338/InsecureRandomness.ql

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,6 @@
1616
import python
1717
import experimental.semmle.python.security.InsecureRandomness
1818
import semmle.python.dataflow.new.DataFlow
19-
2019
import InsecureRandomness::Flow::PathGraph
2120

2221
from InsecureRandomness::Flow::PathNode source, InsecureRandomness::Flow::PathNode sink

python/ql/src/experimental/Security/CWE-348/ClientSuppliedIpUsedInSecurityCheck.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,9 +47,9 @@ private module ClientSuppliedIpUsedInSecurityCheckConfig implements DataFlow::Co
4747
}
4848
}
4949

50-
5150
/** Global taint-tracking for detecting "client ip used in security check" vulnerabilities. */
52-
module ClientSuppliedIpUsedInSecurityCheckFlow = TaintTracking::Global<ClientSuppliedIpUsedInSecurityCheckConfig>;
51+
module ClientSuppliedIpUsedInSecurityCheckFlow =
52+
TaintTracking::Global<ClientSuppliedIpUsedInSecurityCheckConfig>;
5353

5454
from
5555
ClientSuppliedIpUsedInSecurityCheckFlow::PathNode source,

python/ql/src/experimental/Security/CWE-614/CookieInjection.ql

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,7 @@ import experimental.semmle.python.CookieHeader
1717
import experimental.semmle.python.security.injection.CookieInjection
1818
import CookieInjectionFlow::PathGraph
1919

20-
from
21-
CookieInjectionFlow::PathNode source, CookieInjectionFlow::PathNode sink,
22-
string insecure
20+
from CookieInjectionFlow::PathNode source, CookieInjectionFlow::PathNode sink, string insecure
2321
where
2422
CookieInjectionFlow::flowPath(source, sink) and
2523
if exists(sink.getNode().(CookieSink))

python/ql/src/experimental/semmle/python/security/TimingAttack.qll

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -263,7 +263,7 @@ private string sensitiveheaders() {
263263
/**
264264
* A config that tracks data flow from remote user input to Variable that hold sensitive info
265265
*/
266-
module UserInputSecretConfig implements DataFlow::ConfigSig {
266+
module UserInputSecretConfig implements DataFlow::ConfigSig {
267267
predicate isSource(DataFlow::Node source) { source instanceof RemoteFlowSource }
268268

269269
predicate isSink(DataFlow::Node sink) { sink.asExpr() instanceof CredentialExpr }

0 commit comments

Comments
 (0)