Skip to content

Commit f375b81

Browse files
committed
remove reference to command injection owasp
1 parent 3a66e8e commit f375b81

File tree

4 files changed

+1
-22
lines changed

4 files changed

+1
-22
lines changed

powershell/ql/src/experimental/ConvertToSecureStringAsPlainText.qhelp

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,16 +13,10 @@ If you do need an ability to retrieve the password from somewhere without prompt
1313
</recommendation>
1414
<references>
1515

16-
<li>
17-
OWASP:
18-
<a href="https://www.owasp.org/index.php/Command_Injection">Command Injection</a>.
19-
</li>
2016
<li>
2117
PSScriptAnalyzer:
2218
<a href="https://learn.microsoft.com/en-us/powershell/utility-modules/psscriptanalyzer/rules/avoidusingconverttosecurestringwithplaintext?view=ps-modules">AvoidUsingConvertToSecureStringWithPlainText</a>.
2319
</li>
24-
<!-- LocalWords: CWE untrusted unsanitized Runtime
25-
-->
2620

2721
</references>
2822
</qhelp>

powershell/ql/src/experimental/HardcodedComputerName.qhelp

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,6 @@
1414
</recommendation>
1515
<references>
1616

17-
<li>
18-
OWASP:
19-
<a href="https://www.owasp.org/index.php/Command_Injection">Command Injection</a>.
20-
</li>
2117
<li>
2218
PSScriptAnalyzer:
2319
<a href="https://learn.microsoft.com/en-us/powershell/utility-modules/psscriptanalyzer/rules/avoidusingcomputernamehardcoded?view=ps-modules">AvoidUsingComputerNameHardcoded</a>.

powershell/ql/src/experimental/UseOfReservedCmdletChar.qhelp

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,16 +17,10 @@ Reserved Characters include: #,(){}[]&/\\$^;:\"'<>|?@`*%+=~
1717
</recommendation>
1818
<references>
1919

20-
<li>
21-
OWASP:
22-
<a href="https://www.owasp.org/index.php/Command_Injection">Command Injection</a>.
23-
</li>
2420
<li>
2521
PSScriptAnalyzer:
2622
<a href="https://learn.microsoft.com/en-us/powershell/utility-modules/psscriptanalyzer/rules/reservedcmdletchar?view=ps-modules">ReservedCmdletChar</a>.
2723
</li>
28-
<!-- LocalWords: CWE untrusted unsanitized Runtime
29-
-->
3024

3125
</references>
3226
</qhelp>

powershell/ql/src/experimental/UsernameOrPasswordParameter.qhelp

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,16 +14,11 @@
1414
</recommendation>
1515
<references>
1616

17-
<li>
18-
OWASP:
19-
<a href="https://www.owasp.org/index.php/Command_Injection">Command Injection</a>.
20-
</li>
17+
2118
<li>
2219
PSScriptAnalyzer:
2320
<a href="https://learn.microsoft.com/en-us/powershell/utility-modules/psscriptanalyzer/rules/avoidusingusernameandpasswordparams?view=ps-modules">AvoidUsingUsernameAndPasswordParams</a>.
2421
</li>
25-
<!-- LocalWords: CWE untrusted unsanitized Runtime
26-
-->
2722

2823
</references>
2924
</qhelp>

0 commit comments

Comments
 (0)