|
9 | 9 | - asynchronous code, for example [a-sync-waterfall](https://www.npmjs.com/package/a-sync-waterfall) |
10 | 10 | * File classification has been improved to recognize additional generated files, for example files from [HTML Tidy](html-tidy.org). |
11 | 11 |
|
12 | | -* The taint tracking library now recognizes flow through persistent storage, class fields, and callbacks in certain cases. This may give more results for the security queries. |
| 12 | +* The taint tracking library now recognizes flow through persistent storage, class fields, and callbacks in certain cases. Handling of regular expressions has also been improved. This may give more results for the security queries. |
13 | 13 |
|
14 | 14 | * Type inference for function calls has been improved. This may give additional results for queries that rely on type inference. |
15 | 15 |
|
|
33 | 33 |
|
34 | 34 | | **Query** | **Expected impact** | **Change** | |
35 | 35 | |--------------------------------------------|------------------------------|------------------------------------------------------------------------------| |
36 | | -| Client-side cross-site scripting | More true-positive results, fewer false-positive results. | This rule now recognizes WinJS functions that are vulnerable to HTML injection, and no longer flags certain safe uses of jQuery. | |
| 36 | +| Client-side cross-site scripting | More true-positive results, fewer false-positive results. | This rule now recognizes WinJS functions that are vulnerable to HTML injection. It no longer flags certain safe uses of jQuery, and recognizes custom sanitizers. | |
37 | 37 | | Hard-coded credentials | Fewer false-positive results | This rule no longer flag the empty string as a hardcoded username. | |
38 | 38 | | Insecure randomness | More results | This rule now flags insecure uses of `crypto.pseudoRandomBytes`. | |
| 39 | +| Reflected cross-site scripting | Fewer false-positive results. | This rule now recognizes custom sanitizers. | |
| 40 | +| Stored cross-site scripting | Fewer false-positive results. | This rule now recognizes custom sanitizers. | |
39 | 41 | | Uncontrolled data used in network request | More results | This rule now recognizes host values that are vulnerable to injection. | |
40 | 42 | | Unused parameter | Fewer false-positive results | This rule no longer flags parameters with leading underscore. | |
41 | 43 | | Unused variable, import, function or class | Fewer false-positive results | This rule now flags fewer variables that are implictly used by JSX elements, and no longer flags variables with leading underscore. | |
|
0 commit comments