Skip to content

Commit d96153a

Browse files
am0o0hmac
authored andcommitted
v1.2 change to PascalCase
1 parent e4b8a0e commit d96153a

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

ruby/ql/src/experimental/CWE-502/YAMLUnsafeYamlDeserialization.ql

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ import codeql.ruby.TaintTracking
2020
import DataFlow::PathGraph
2121
import codeql.ruby.security.UnsafeDeserializationCustomizations
2222

23-
abstract class YAMLSink extends DataFlow::Node { }
23+
abstract class YamlSink extends DataFlow::Node { }
2424

25-
class YamlunsafeLoadArgument extends YAMLSink {
26-
YamlunsafeLoadArgument() {
25+
class YamlUnsafeLoadArgument extends YamlSink {
26+
YamlUnsafeLoadArgument() {
2727
this =
2828
API::getTopLevelMember(["YAML", "Psych"])
2929
.getAMethodCall(["unsafe_load_file", "unsafe_load", "load_stream"])
@@ -53,7 +53,7 @@ class Configuration extends TaintTracking::Configuration {
5353
override predicate isSink(DataFlow::Node sink) {
5454
// for detecting The CVE we should uncomment following line
5555
// sink.getLocation().getFile().toString().matches("%yaml_column%") and
56-
sink instanceof YAMLSink or
56+
sink instanceof YamlSink or
5757
sink =
5858
API::getTopLevelMember(["YAML", "Psych"])
5959
.getAMethodCall(["parse", "parse_stream", "parse_file"])

0 commit comments

Comments
 (0)