Skip to content

Commit cf121cc

Browse files
committed
Python: TaintTracking: stringMethods => stringManipualtion
1 parent 238e084 commit cf121cc

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

python/ql/src/experimental/dataflow/internal/TaintTrackingPrivate.qll

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ predicate localAdditionalTaintStep(DataFlow::Node nodeFrom, DataFlow::Node nodeT
2929
or
3030
subscriptStep(nodeFrom, nodeTo)
3131
or
32-
stringMethods(nodeFrom, nodeTo)
32+
stringManipulation(nodeFrom, nodeTo)
3333
}
3434

3535
/**
@@ -59,7 +59,7 @@ predicate subscriptStep(DataFlow::CfgNode nodeFrom, DataFlow::CfgNode nodeTo) {
5959
* Note that since we cannot easily distinguish when something is a string, this can
6060
* also make taint flow on `<non string>.replace(foo, bar)`.
6161
*/
62-
predicate stringMethods(DataFlow::CfgNode nodeFrom, DataFlow::CfgNode nodeTo) {
62+
predicate stringManipulation(DataFlow::CfgNode nodeFrom, DataFlow::CfgNode nodeTo) {
6363
// transforming something tainted into a string will make the string tainted
6464
exists(CallNode call | call = nodeTo.getNode() |
6565
call.getFunction().(NameNode).getId() in ["str", "bytes", "unicode"] and

0 commit comments

Comments
 (0)