You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/codeql/codeql-language-guides/analyzing-data-flow-in-swift.rst
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,12 +29,12 @@ The ``Node`` class has a number of useful subclasses, such as ``ExprNode`` for e
29
29
30
30
class Node {
31
31
/**
32
-
* Gets this node's underlying expression, if any.
32
+
* Gets the expression that corresponds to this node, if any.
33
33
*/
34
34
Expr asExpr() { ... }
35
35
36
36
/**
37
-
* Gets this data flow node's corresponding control flow node.
37
+
* Gets the control flow node that corresponds to this data flow node.
38
38
*/
39
39
ControlFlowNode getCfgNode() { ... }
40
40
@@ -203,7 +203,7 @@ Using global taint tracking
203
203
204
204
Global taint tracking is to global data flow what local taint tracking is to local data flow.
205
205
That is, global taint tracking extends global data flow with additional non-value-preserving steps.
206
-
The global taint tracking library uses the same configuration module as the global data flow library but taint flow analysis is performed with ``TaintTracking::Global``:
206
+
The global taint tracking library uses the same configuration module as the global data flow library. You can perform taint flow analysis using ``TaintTracking::Global``:
207
207
208
208
.. code-block:: ql
209
209
@@ -216,7 +216,7 @@ The global taint tracking library uses the same configuration module as the glob
216
216
Predefined sources
217
217
~~~~~~~~~~~~~~~~~~
218
218
219
-
The data flow library module ``codeql.swift.dataflow.FlowSources`` contains a number of predefined sources, providing a good starting point for defining data flow and taint flow based security queries.
219
+
The data flow library module ``codeql.swift.dataflow.FlowSources`` contains a number of predefined sources that you can use to write security queries to track data flow and taint flow.
220
220
221
221
- The class ``RemoteFlowSource`` represents data flow from remote network inputs and from other applications.
222
222
- The class ``LocalFlowSource`` represents data flow from local user input.
@@ -229,7 +229,7 @@ The following global taint-tracking query finds places where a string literal is
229
229
- Since this is a taint-tracking query, the ``TaintTracking::Global`` module is used.
230
230
- The ``isSource`` predicate defines sources as any ``StringLiteralExpr``.
231
231
- The ``isSink`` predicate defines sinks as arguments to a ``CallExpr`` called "password".
232
-
- The sources and sinks may need tuning to a particular use, for example if passwords are represented by a type other than ``String`` or passed in arguments of a different name than "password".
232
+
- The sources and sinks may need tuning to a particular use, for example, if passwords are represented by a type other than ``String`` or passed in arguments of a different name than "password".
0 commit comments