Skip to content

Commit a57f4a1

Browse files
committed
Update Java analysis query metadata
1 parent e03f57d commit a57f4a1

File tree

4 files changed

+26
-9
lines changed

4 files changed

+26
-9
lines changed

java/ql/src/experimental/quantum/Analysis/InsecureNonceSource.ql

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,13 @@
11
/**
22
* @name Insecure nonce at a cipher operation
3-
* @id java/insecure-nonce
3+
* @id java/quantum/insecure-nonce
4+
* @description A nonce is generated from a source that is not secure. This can lead to
5+
* vulnerabilities such as replay attacks or key recovery.
46
* @kind problem
57
* @problem.severity error
68
* @precision high
7-
* @description A nonce is generated from a source that is not secure. This can lead to
8-
* vulnerabilities such as replay attacks or key recovery.
9+
* @tags quantum
10+
* experimental
911
*/
1012

1113
import experimental.quantum.Language

java/ql/src/experimental/quantum/Analysis/KnownWeakKDFIterationCount.ql

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,12 @@
11
/**
2-
* @name Detects known weak KDf iteration counts (less than 100k and the count is statically known)
3-
* @id java/crypto_inventory_filters/known_weak_kdf_iteration_count
2+
* @name Weak known key derivation function iteration count
3+
* @description Detects key derivation operations with a known weak iteration count.
4+
* @id java/quantum/weak-kdf-iteration-count
45
* @kind problem
6+
* @precision high
7+
* @severity problem
8+
* @tags quantum
9+
* experimental
510
*/
611

712
import java

java/ql/src/experimental/quantum/Analysis/ReusedNonce.ql

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,12 @@
11
/**
2-
* @name Detects reuse of the same nonce in multiple operations
3-
* @id java/crypto_inventory_filter/nonce_reuse
2+
* @name Reuse of cryptographic nonce
3+
* @description Reuse of nonce in cryptographic operations can lead to vulnerabilities.
4+
* @id java/quantum/reused-nonce
45
* @kind problem
6+
* @precision medium
7+
* @severity problem
8+
* @tags quantum
9+
* experimental
510
*/
611

712
import java

java/ql/src/experimental/quantum/Analysis/UnknownKDFIterationCount.ql

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,12 @@
11
/**
2-
* @name Detects unknown KDf iteration counts
3-
* @id java/crypto_inventory_filters/unknown_kdf_iteration_count
2+
* @name Unknown key derivation function iteration count
3+
* @description Detects key derivation operations with an unknown iteration count.
4+
* @id java/quantum/unknown-kdf-iteration-count
45
* @kind problem
6+
* @precision medium
7+
* @severity warning
8+
* @tags quantum
9+
* experimental
510
*/
611

712
import java

0 commit comments

Comments
 (0)