Skip to content

Commit c2309a9

Browse files
authored
Merge pull request #20638 from github/post-release-prep/codeql-cli-2.23.3
Post-release preparation for codeql-cli-2.23.3
2 parents da0b168 + 6dd0779 commit c2309a9

File tree

183 files changed

+453
-157
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

183 files changed

+453
-157
lines changed

actions/ql/lib/CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Lines changed: 3 additions & 0 deletions
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
---
2-
lastReleaseVersion: 0.4.18
2+
lastReleaseVersion: 0.4.19

actions/ql/lib/qlpack.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
name: codeql/actions-all
2-
version: 0.4.19-dev
2+
version: 0.4.20-dev
33
library: true
44
warnOnImplicitThis: true
55
dependencies:

actions/ql/src/CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Lines changed: 3 additions & 0 deletions
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
---
2-
lastReleaseVersion: 0.6.10
2+
lastReleaseVersion: 0.6.11

actions/ql/src/experimental/Security/CWE-200/SecretExfiltration.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,5 +19,5 @@ import SecretExfiltrationFlow::PathGraph
1919
from SecretExfiltrationFlow::PathNode source, SecretExfiltrationFlow::PathNode sink
2020
where SecretExfiltrationFlow::flowPath(source, sink)
2121
select sink.getNode(), source, sink,
22-
"Potential secret exfiltration in $@, which may be be leaked to an attacker-controlled resource.",
22+
"Potential secret exfiltration in $@, which may be leaked to an attacker-controlled resource.",
2323
sink, sink.getNode().asExpr().(Expression).getRawExpression()

actions/ql/src/qlpack.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
name: codeql/actions-queries
2-
version: 0.6.11-dev
2+
version: 0.6.12-dev
33
library: false
44
warnOnImplicitThis: true
55
groups: [actions, queries]

actions/ql/test/query-tests/Security/CWE-200/SecretExfiltration.expected

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,4 +3,4 @@ nodes
33
| .github/workflows/test1.yml:15:11:16:75 | github.event.pull_request.title | semmle.label | github.event.pull_request.title |
44
subpaths
55
#select
6-
| .github/workflows/test1.yml:15:11:16:75 | github.event.pull_request.title | .github/workflows/test1.yml:15:11:16:75 | github.event.pull_request.title | .github/workflows/test1.yml:15:11:16:75 | github.event.pull_request.title | Potential secret exfiltration in $@, which may be be leaked to an attacker-controlled resource. | .github/workflows/test1.yml:15:11:16:75 | github.event.pull_request.title | ${{ github.event.pull_request.title }} |
6+
| .github/workflows/test1.yml:15:11:16:75 | github.event.pull_request.title | .github/workflows/test1.yml:15:11:16:75 | github.event.pull_request.title | .github/workflows/test1.yml:15:11:16:75 | github.event.pull_request.title | Potential secret exfiltration in $@, which may be leaked to an attacker-controlled resource. | .github/workflows/test1.yml:15:11:16:75 | github.event.pull_request.title | ${{ github.event.pull_request.title }} |

0 commit comments

Comments
 (0)