Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit cf58914

Browse files
max-schaeferjf205
andauthored
Apply suggestions from code review
Co-authored-by: James Fletcher <[email protected]>
1 parent f8d8a9b commit cf58914

2 files changed

Lines changed: 2 additions & 2 deletions

File tree

docs/codeql/codeql-language-guides/codeql-for-javascript.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Experiment and learn how to write effective and efficient queries for CodeQL dat
2828

2929
- :doc:`Using flow labels for precise data flow analysis <using-flow-labels-for-precise-data-flow-analysis>`: You can associate flow labels with each value tracked by the flow analysis to determine whether the flow contains potential vulnerabilities.
3030

31-
- :doc:`Specifying remote flow sources for JavaScript <specifying-additional-remote-flow-sources-for-javascript>`: You can model potential sources of untrusted user input in external files without making changes to the CodeQL standard library.
31+
- :doc:`Specifying remote flow sources for JavaScript <specifying-additional-remote-flow-sources-for-javascript>`: You can model potential sources of untrusted user input in your code without making changes to the CodeQL standard library by specifying extra remote flow sources in an external file.
3232

3333
- :doc:`Using type tracking for API modeling <using-type-tracking-for-api-modeling>`: You can track data through an API by creating a model using the CodeQL type-tracking library for JavaScript.
3434

docs/codeql/codeql-language-guides/specifying-additional-remote-flow-sources-for-javascript.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
Specifying additional remote flow sources for JavaScript
44
========================================================
55

6-
You can model potential sources of untrusted user input in external files without making changes to the CodeQL standard library.
6+
You can model potential sources of untrusted user input in your code without making changes to the CodeQL standard library by specifying extra remote flow sources in an external file.
77

88
.. pull-quote::
99

0 commit comments

Comments
 (0)