Skip to content

Commit caf6b95

Browse files
committed
Remove trailing periods from @name metadata in query files
Fixed 73 .ql query files where the @name metadata contained an ending period. This ensures consistency with the CodeQL query metadata style guidelines.
1 parent adc13e3 commit caf6b95

File tree

73 files changed

+73
-73
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+73
-73
lines changed

actions/ql/src/experimental/Security/CWE-829/ArtifactPoisoningPathTraversal.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name Artifact Poisoning (Path Traversal).
2+
* @name Artifact Poisoning (Path Traversal)
33
* @description An attacker may be able to poison the workflow's artifacts and influence on consequent steps.
44
* @kind problem
55
* @problem.severity error

cpp/ql/src/experimental/Security/CWE/CWE-125/DangerousWorksWithMultibyteOrWideCharacters.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name Dangerous use convert function.
2+
* @name Dangerous use convert function
33
* @description Using convert function with an invalid length argument can result in an out-of-bounds access error or unexpected result.
44
* @kind problem
55
* @id cpp/dangerous-use-convert-function

cpp/ql/src/experimental/Security/CWE/CWE-190/DangerousUseOfTransformationAfterOperation.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name Dangerous use of transformation after operation.
2+
* @name Dangerous use of transformation after operation
33
* @description By using the transformation after the operation, you are doing a pointless and dangerous action.
44
* @kind problem
55
* @id cpp/dangerous-use-of-transformation-after-operation

cpp/ql/src/experimental/Security/CWE/CWE-200/ExposureSensitiveInformationUnauthorizedActor.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name Writing to a file without setting permissions.
2+
* @name Writing to a file without setting permissions
33
* @description Lack of restriction on file access rights can be unsafe.
44
* @kind problem
55
* @id cpp/work-with-file-without-permissions-rights

cpp/ql/src/experimental/Security/CWE/CWE-243/IncorrectChangingWorkingDirectory.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name Find work with changing working directories, with security errors.
2+
* @name Find work with changing working directories, with security errors
33
* @description Not validating the return value or pinning the directory can be unsafe.
44
* @kind problem
55
* @id cpp/work-with-changing-working-directories

cpp/ql/src/experimental/Security/CWE/CWE-266/IncorrectPrivilegeAssignment.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name Find the wrong use of the umask function.
2+
* @name Find the wrong use of the umask function
33
* @description Incorrectly evaluated argument to the umask function may have security implications.
44
* @kind problem
55
* @id cpp/wrong-use-of-the-umask

cpp/ql/src/experimental/Security/CWE/CWE-377/InsecureTemporaryFile.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name Insecure generation of filenames.
2+
* @name Insecure generation of filenames
33
* @description Using a predictable filename when creating a temporary file can lead to an attacker-controlled input.
44
* @kind problem
55
* @id cpp/insecure-generation-of-filename

cpp/ql/src/experimental/Security/CWE/CWE-476/DangerousUseOfExceptionBlocks.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name Dangerous use of exception blocks.
2+
* @name Dangerous use of exception blocks
33
* @description When clearing the data in the catch block, you must be sure that the memory was allocated before the exception.
44
* @kind problem
55
* @id cpp/dangerous-use-of-exception-blocks

cpp/ql/src/experimental/Security/CWE/CWE-670/DangerousUseSSL_shutdown.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name Dangerous use SSL_shutdown.
2+
* @name Dangerous use SSL_shutdown
33
* @description Incorrect closing of the connection leads to the creation of different states for the server and client, which can be exploited by an attacker.
44
* @kind problem
55
* @id cpp/dangerous-use-of-ssl-shutdown

cpp/ql/src/utils/modelgenerator/CaptureContentSummaryModels.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name Capture content based summary models.
2+
* @name Capture content based summary models
33
* @description Finds applicable content based summary models to be used by other queries.
44
* @kind diagnostic
55
* @id cpp/utils/modelgenerator/contentbased-summary-models

0 commit comments

Comments
 (0)