We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent bf22c6d commit c7efde3Copy full SHA for c7efde3
java/ql/lib/semmle/code/java/security/SensitiveLoggingQuery.qll
@@ -9,7 +9,12 @@ private import semmle.code.java.security.Sanitizers
9
10
/** A variable that may hold sensitive information, judging by its name. */
11
class VariableWithSensitiveName extends Variable {
12
- VariableWithSensitiveName() { this.getName().regexpMatch(getCommonSensitiveInfoRegex()) }
+ VariableWithSensitiveName() {
13
+ exists(string name | name = this.getName() |
14
+ name.regexpMatch(getCommonSensitiveInfoRegex()) and
15
+ not name.regexpMatch("(?i).*null.*")
16
+ )
17
+ }
18
}
19
20
/** A reference to a variable that may hold sensitive information, judging by its name. */
0 commit comments