Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 2ac2233

Browse files
Mark Shannonmarkshannon
authored andcommitted
Add change note for enhance visibility of security alerts and conversion to path-queries.
1 parent 24bf292 commit 2ac2233

1 file changed

Lines changed: 38 additions & 0 deletions

File tree

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
# Improvements to Python analysis
2+
3+
4+
## General improvements
5+
6+
> Changes that affect alerts in many files or from many queries
7+
> For example, changes to file classification
8+
9+
## New queries
10+
11+
| **Query** | **Tags** | **Purpose** |
12+
|-----------------------------|-----------|--------------------------------------------------------------------|
13+
| *@name of query (Query ID)* | *Tags* |*Aim of the new query and whether it is enabled by default or not* |
14+
15+
## Changes to existing queries
16+
17+
All taint-tracking queries now support visualization of paths in QL for Eclipse.
18+
Most security alerts are now visible on LGTM by default.
19+
20+
| **Query** | **Expected impact** | **Change** |
21+
|----------------------------|------------------------|------------------------------------------------------------------|
22+
| Code injection (`py/code-injection`) | Supports path visualization and is now visible on LGTM by default | No change to expected results |
23+
| Deserializing untrusted input (`py/unsafe-deserialization`) | Supports path visualization | No change to expected results |
24+
| Information exposure through an exception (`py/stack-trace-exposure`) | Now visible on LGTM by default | No change to expected results |
25+
| Reflected server-side cross-site scripting (`py/reflective-xss`) | Supports path visualization and is now visible on LGTM by default | No change to expected results |
26+
| SQL query built from user-controlled sources (`py/sql-injection`) | Supports path visualization and is now visible on LGTM by default | No change to expected results |
27+
| Uncontrolled data used in path expression (`py/path-injection`) | Supports path visualization and is now visible on LGTM by default | No change to expected results |
28+
| Uncontrolled command line (`py/command-line-injection`) | Supports path visualization and is now visible on LGTM by default | No change to expected results |
29+
| URL redirection from remote source (`py/url-redirection`) | Supports path visualization and is now visible on LGTM by default | No change to expected results |
30+
31+
## Changes to code extraction
32+
33+
* *Series of bullet points*
34+
35+
## Changes to QL libraries
36+
37+
* *Series of bullet points*
38+

0 commit comments

Comments
 (0)