|
10 | 10 |
|
11 | 11 | * The taint tracking library now recognizes flow through persistent storage, class fields, and callbacks in certain cases. This may give more results for the security queries. |
12 | 12 |
|
| 13 | +* Type inference for function calls has been improved. This may give additional results for queries that rely on type inference. |
| 14 | + |
| 15 | +* The [Closure-Library](https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.provide) module system is now supported. |
| 16 | + |
13 | 17 | ## New queries |
14 | 18 |
|
15 | 19 | | **Query** | **Tags** | **Purpose** | |
16 | 20 | |-----------------------------------------------|------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------| |
17 | 21 | | Arrow method on Vue instance (`js/vue/arrow-method-on-vue-instance`) | reliability, frameworks/vue | Highlights arrow functions that are used as methods on Vue instances. Results are shown on LGTM by default.| |
| 22 | +| Cross-window communication with unrestricted target origin (`js/cross-window-information-leak`) | security, external/cwe/201, external/cwe/359 | Highlights code that sends potentially sensitive information to another window without restricting the receiver window's origin, indicating a possible violation of [CWE-201](https://cwe.mitre.org/data/definitions/201.html). Results are shown on LGTM by default. | |
18 | 23 | | Double escaping or unescaping (`js/double-escaping`) | correctness, security, external/cwe/cwe-116 | Highlights potential double escaping or unescaping of special characters, indicating a possible violation of [CWE-116](https://cwe.mitre.org/data/definitions/116.html). Results are shown on LGTM by default. | |
19 | 24 | | Incomplete regular expression for hostnames (`js/incomplete-hostname-regexp`) | correctness, security, external/cwe/cwe-020 | Highlights hostname sanitizers that are likely to be incomplete, indicating a violation of [CWE-020](https://cwe.mitre.org/data/definitions/20.html). Results are shown on LGTM by default.| |
20 | 25 | | Incomplete URL substring sanitization | correctness, security, external/cwe/cwe-020 | Highlights URL sanitizers that are likely to be incomplete, indicating a violation of [CWE-020](https://cwe.mitre.org/data/definitions/20.html). Results shown on LGTM by default. | |
|
28 | 33 | | **Query** | **Expected impact** | **Change** | |
29 | 34 | |--------------------------------------------|------------------------------|------------------------------------------------------------------------------| |
30 | 35 | | Client-side cross-site scripting | More true-positive results, fewer false-positive results. | This rule now recognizes WinJS functions that are vulnerable to HTML injection, and no longer flags certain safe uses of jQuery. | |
| 36 | +| Hard-coded credentials | Fewer false-positive results | This rule no longer flag the empty string as a hardcoded username. | |
31 | 37 | | Insecure randomness | More results | This rule now flags insecure uses of `crypto.pseudoRandomBytes`. | |
32 | 38 | | Uncontrolled data used in network request | More results | This rule now recognizes host values that are vulnerable to injection. | |
33 | 39 | | Unused parameter | Fewer false-positive results | This rule no longer flags parameters with leading underscore. | |
|
0 commit comments