Skip to content

Commit d46899d

Browse files
committed
(Multiple languages) Be clearer about which query is being discussed
1 parent 6d9daec commit d46899d

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

docs/codeql/codeql-language-guides/analyzing-data-flow-in-csharp.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ Then we can make the source more specific, for example an access to a public par
117117
and call.getEnclosingCallable().(Member).isPublic()
118118
select p, "Opening a file from a public method."
119119
120-
This query finds calls to ``String.Format`` where the format string isn't hard-coded:
120+
The following query finds calls to ``String.Format`` where the format string isn't hard-coded:
121121

122122
.. code-block:: ql
123123

docs/codeql/codeql-language-guides/analyzing-data-flow-in-go.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ For example, you can find taint propagation from a parameter ``source`` to an ex
9393
Examples
9494
~~~~~~~~
9595

96-
This query finds the filename passed to ``os.Open(..)``.
96+
This query finds the filename passed to ``os.Open(..)``:
9797

9898
.. code-block:: ql
9999
@@ -131,7 +131,7 @@ Then we can make the source more specific, for example an access to a parameter.
131131
DataFlow::localFlow(DataFlow::parameterNode(p), DataFlow::exprNode(call.getArgument(0)))
132132
select p
133133
134-
This query finds calls to formatting functions where the format string is not hard-coded.
134+
The following query finds calls to formatting functions where the format string is not hard-coded.
135135
Note that `StringOps::Formatting::Range <https://codeql.github.com/codeql-standard-libraries/go/semmle/go/StringOps.qll/type.StringOps$StringOps$Formatting$Range.html>`_ is a class that represents all functions which have a format string, and its member predicate `getFormatStringIndex` gives the index of the argument which is the format string.
136136

137137
.. code-block:: ql

docs/codeql/codeql-language-guides/analyzing-data-flow-in-java.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ For example, you can find taint propagation from a parameter ``source`` to an ex
9797
Examples
9898
~~~~~~~~
9999

100-
This query finds the filename passed to ``new FileReader(..)``.
100+
This query finds the filename passed to ``new FileReader(..)``:
101101

102102
.. code-block:: ql
103103
@@ -137,7 +137,7 @@ Then we can make the source more specific, for example an access to a public par
137137
DataFlow::localFlow(DataFlow::parameterNode(p), DataFlow::exprNode(call.getArgument(0)))
138138
select p
139139
140-
This query finds calls to formatting functions where the format string is not hard-coded.
140+
The following query finds calls to formatting functions where the format string is not hard-coded.
141141

142142
.. code-block:: ql
143143

0 commit comments

Comments
 (0)