Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 8e82787

Browse files
committed
Add predicate defaultTaintSanitizerGuard for each language
This was done manually, as these files are not synced by sync-files.py.
1 parent c112980 commit 8e82787

5 files changed

Lines changed: 30 additions & 0 deletions

File tree

cpp/ql/lib/semmle/code/cpp/dataflow/internal/TaintTrackingUtil.qll

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,12 @@ predicate defaultImplicitTaintRead(DataFlow::Node node, DataFlow::Content c) { n
4747
*/
4848
predicate defaultTaintSanitizer(DataFlow::Node node) { none() }
4949

50+
/**
51+
* Holds if `guard` should be a sanitizer guard in all global taint flow configurations
52+
* but not in local taint.
53+
*/
54+
predicate defaultTaintSanitizerGuard(DataFlow::BarrierGuard guard) { none() }
55+
5056
/**
5157
* Holds if taint can flow in one local step from `nodeFrom` to `nodeTo` excluding
5258
* local data flow steps. That is, `nodeFrom` and `nodeTo` are likely to represent

cpp/ql/lib/semmle/code/cpp/ir/dataflow/internal/TaintTrackingUtil.qll

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -160,6 +160,12 @@ predicate defaultImplicitTaintRead(DataFlow::Node node, DataFlow::Content c) { n
160160
*/
161161
predicate defaultTaintSanitizer(DataFlow::Node node) { none() }
162162

163+
/**
164+
* Holds if `guard` should be a sanitizer guard in all global taint flow configurations
165+
* but not in local taint.
166+
*/
167+
predicate defaultTaintSanitizerGuard(DataFlow::BarrierGuard guard) { none() }
168+
163169
/**
164170
* Holds if taint can flow from `instrIn` to `instrOut` through a call to a
165171
* modeled function.

csharp/ql/lib/semmle/code/csharp/dataflow/internal/TaintTrackingPrivate.qll

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,12 @@ private import semmle.code.csharp.frameworks.WCF
1818
*/
1919
predicate defaultTaintSanitizer(DataFlow::Node node) { none() }
2020

21+
/**
22+
* Holds if `guard` should be a sanitizer guard in all global taint flow configurations
23+
* but not in local taint.
24+
*/
25+
predicate defaultTaintSanitizerGuard(DataFlow::BarrierGuard guard) { none() }
26+
2127
/**
2228
* Holds if default `TaintTracking::Configuration`s should allow implicit reads
2329
* of `c` at sinks and inputs to additional taint steps.

python/ql/lib/semmle/python/dataflow/new/internal/TaintTrackingPrivate.qll

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,12 @@ private import semmle.python.ApiGraphs
1010
*/
1111
predicate defaultTaintSanitizer(DataFlow::Node node) { none() }
1212

13+
/**
14+
* Holds if `guard` should be a sanitizer guard in all global taint flow configurations
15+
* but not in local taint.
16+
*/
17+
predicate defaultTaintSanitizerGuard(DataFlow::BarrierGuard guard) { none() }
18+
1319
/**
1420
* Holds if default `TaintTracking::Configuration`s should allow implicit reads
1521
* of `c` at sinks and inputs to additional taint steps.

ruby/ql/lib/codeql/ruby/dataflow/internal/TaintTrackingPrivate.qll

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,12 @@ private import FlowSummaryImpl as FlowSummaryImpl
1010
*/
1111
predicate defaultTaintSanitizer(DataFlow::Node node) { none() }
1212

13+
/**
14+
* Holds if `guard` should be a sanitizer guard in all global taint flow configurations
15+
* but not in local taint.
16+
*/
17+
predicate defaultTaintSanitizerGuard(DataFlow::BarrierGuard guard) { none() }
18+
1319
/**
1420
* Holds if default `TaintTracking::Configuration`s should allow implicit reads
1521
* of `c` at sinks and inputs to additional taint steps.

0 commit comments

Comments
 (0)