Skip to content

Commit 7098e7b

Browse files
committed
change more queries to start with "This "
1 parent 77eeabe commit 7098e7b

30 files changed

+86
-86
lines changed

csharp/ql/campaigns/Solorigate/src/NumberOfKnownCommandsAboveThreshold.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,5 +34,5 @@ where
3434
total = countSolorigateCommandInEnum(e) and
3535
total > 10
3636
select e,
37-
"The enum may be related to Solorigate. It matches " + total +
37+
"This enum may be related to Solorigate. It matches " + total +
3838
" of the values used for commands in the enum."

csharp/ql/src/Security Features/CWE-078/CommandInjection.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,5 +19,5 @@ import semmle.code.csharp.dataflow.DataFlow::DataFlow::PathGraph
1919

2020
from TaintTrackingConfiguration c, DataFlow::PathNode source, DataFlow::PathNode sink
2121
where c.hasFlowPath(source, sink)
22-
select sink.getNode(), source, sink, "Command line depends on a $@.", source.getNode(),
22+
select sink.getNode(), source, sink, "This command line depends on a $@.", source.getNode(),
2323
"user-provided value"

csharp/ql/src/Security Features/CWE-078/StoredCommandInjection.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,5 +24,5 @@ class StoredTaintTrackingConfiguration extends TaintTrackingConfiguration {
2424

2525
from StoredTaintTrackingConfiguration c, DataFlow::PathNode source, DataFlow::PathNode sink
2626
where c.hasFlowPath(source, sink)
27-
select sink.getNode(), source, sink, "Command line depends on a $@.", source.getNode(),
27+
select sink.getNode(), source, sink, "This command line depends on a $@.", source.getNode(),
2828
"stored (potentially user-provided) value"

csharp/ql/src/Security Features/CWE-079/StoredXSS.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,5 +31,5 @@ where
3131
if exists(sink.getNode().(Sink).explanation())
3232
then explanation = " (" + sink.getNode().(Sink).explanation() + ")"
3333
else explanation = ""
34-
select sink.getNode(), source, sink, "HTML or JavaScript write" + explanation + " depends on a $@.",
34+
select sink.getNode(), source, sink, "This HTML or JavaScript write" + explanation + " depends on a $@.",
3535
source.getNode(), "stored (potentially user-provided) value"

csharp/ql/src/Security Features/CWE-090/LDAPInjection.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,5 +17,5 @@ import semmle.code.csharp.dataflow.DataFlow::DataFlow::PathGraph
1717

1818
from TaintTrackingConfiguration c, DataFlow::PathNode source, DataFlow::PathNode sink
1919
where c.hasFlowPath(source, sink)
20-
select sink.getNode(), source, sink, "LDAP query depends on a $@.", source.getNode(),
20+
select sink.getNode(), source, sink, "This LDAP query depends on a $@.", source.getNode(),
2121
"user-provided value"

csharp/ql/src/Security Features/CWE-099/ResourceInjection.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,5 +17,5 @@ import semmle.code.csharp.dataflow.DataFlow::DataFlow::PathGraph
1717

1818
from TaintTrackingConfiguration c, DataFlow::PathNode source, DataFlow::PathNode sink
1919
where c.hasFlowPath(source, sink)
20-
select sink.getNode(), source, sink, "Resource descriptor depends on a $@.", source.getNode(),
20+
select sink.getNode(), source, sink, "This resource descriptor depends on a $@.", source.getNode(),
2121
"user-provided value"

csharp/ql/src/Security Features/CWE-112/MissingXMLValidation.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,5 +18,5 @@ import semmle.code.csharp.dataflow.DataFlow::DataFlow::PathGraph
1818
from TaintTrackingConfiguration c, DataFlow::PathNode source, DataFlow::PathNode sink
1919
where c.hasFlowPath(source, sink)
2020
select sink.getNode(), source, sink,
21-
"XML processing depends on a $@ without validation because " + sink.getNode().(Sink).getReason(),
21+
"This XML processing depends on a $@ without validation because " + sink.getNode().(Sink).getReason(),
2222
source.getNode(), "user-provided value"

csharp/ql/src/Security Features/CWE-117/LogForging.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,5 +17,5 @@ import semmle.code.csharp.dataflow.DataFlow::DataFlow::PathGraph
1717

1818
from TaintTrackingConfiguration c, DataFlow::PathNode source, DataFlow::PathNode sink
1919
where c.hasFlowPath(source, sink)
20-
select sink.getNode(), source, sink, "Log entry depends on a $@.", source.getNode(),
20+
select sink.getNode(), source, sink, "This log entry depends on a $@.", source.getNode(),
2121
"user-provided value"

csharp/ql/src/Security Features/CWE-134/UncontrolledFormatString.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,5 +39,5 @@ string getSourceType(DataFlow::Node node) {
3939

4040
from FormatStringConfiguration config, DataFlow::PathNode source, DataFlow::PathNode sink
4141
where config.hasFlowPath(source, sink)
42-
select sink.getNode(), source, sink, "Format string depends on $@.", source.getNode(),
42+
select sink.getNode(), source, sink, "This format string depends on $@.", source.getNode(),
4343
("this" + getSourceType(source.getNode()))

csharp/ql/src/Security Features/CWE-201/ExposureInTransmittedData.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,5 +47,5 @@ class TaintTrackingConfiguration extends TaintTracking::Configuration {
4747

4848
from TaintTrackingConfiguration configuration, DataFlow::PathNode source, DataFlow::PathNode sink
4949
where configuration.hasFlowPath(source, sink)
50-
select sink.getNode(), source, sink, "Data transmitted to the user depends on $@.",
50+
select sink.getNode(), source, sink, "This data transmitted to the user depends on $@.",
5151
source.getNode(), "sensitive information"

0 commit comments

Comments
 (0)