Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 4720e6c

Browse files
author
james
committed
typo
1 parent 99a634d commit 4720e6c

2 files changed

Lines changed: 2 additions & 2 deletions

File tree

docs/codeql/codeql-language-guides/codeql-for-javascript.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Experiment and learn how to write effective and efficient queries for CodeQL dat
2828

2929
- :doc:`Using flow labels for precise data flow analysis <using-flow-labels-for-precise-data-flow-analysis>`: You can associate flow labels with each value tracked by the flow analysis to determine whether the flow contains potential vulnerabilities.
3030

31-
- :doc:`Specifying remote flow sources for JavaScript <specifying-additional-remote-flow-sources-for-javascript>`: You can model potential sources of untrusted user input without making changes to the CodeQL standard libary fror JavaScript.
31+
- :doc:`Specifying remote flow sources for JavaScript <specifying-additional-remote-flow-sources-for-javascript>`: You can model potential sources of untrusted user input without making changes to the CodeQL standard library for JavaScript.
3232

3333
- :doc:`Using type tracking for API modeling <using-type-tracking-for-api-modeling>`: You can track data through an API by creating a model using the CodeQL type-tracking library for JavaScript.
3434

docs/codeql/codeql-language-guides/specifying-additional-remote-flow-sources-for-javascript.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
Specifying additional remote flow sources for JavaScript
44
========================================================
55

6-
You can model potential sources of untrusted user input without making changes to the CodeQL standard libary fror JavaScript.
6+
You can model potential sources of untrusted user input without making changes to the CodeQL standard library for JavaScript.
77

88
As mentioned in the :doc:`Data flow cheat sheet for JavaScript <data-flow-cheat-sheet-for-javascript>`, the CodeQL libraries for JavaScript
99
provide a class `RemoteFlowSource <https://codeql.github.com/codeql-standard-libraries/javascript/semmle/javascript/security/dataflow/RemoteFlowSources.qll/type.RemoteFlowSources$RemoteFlowSource.html>`__ to represent sources of untrusted user input, sometimes also referred to as `remote flow

0 commit comments

Comments
 (0)