Skip to content

Commit e4dab17

Browse files
geoffw0MathiasVP
andauthored
Apply suggestions from code review
Co-authored-by: Mathias Vorreiter Pedersen <mathiasvp@github.com>
1 parent 9d49986 commit e4dab17

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

swift/ql/src/queries/Security/CWE-079/UnsafeWebViewFetch.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ class UnsafeWebViewFetchConfig extends TaintTracking::Configuration {
119119
c.getAMember() = f and
120120
f.getName() = ["init(string:)", "init(string:relativeTo:)"] and
121121
call.getFunction().(ApplyExpr).getStaticTarget() = f and
122-
node1.asExpr() = call.getArgument(_).getExpr() and
122+
node1.asExpr() = call.getAnArgument().getExpr() and
123123
node2.asExpr() = call
124124
)
125125
}
@@ -140,4 +140,4 @@ where
140140
config.hasFlow(_, any(DataFlow::Node n | n.asExpr() = sink.getBaseUrl())) and
141141
message = "Tainted data is used in a WebView fetch with a tainted base URL."
142142
)
143-
select sinkNode, sourceNode, sinkNode, message
143+
select sink, sourceNode, sinkNode, message

0 commit comments

Comments
 (0)