From da86668cfd243a0a00651989fa6562adb25e33a8 Mon Sep 17 00:00:00 2001 From: Owen Mansel-Chan <owen-mc@github.com> Date: Fri, 17 Jan 2025 17:00:02 +0000 Subject: [PATCH] (Multiple languages) Use slightly clearer wording --- .../codeql-language-guides/analyzing-data-flow-in-csharp.rst | 2 +- .../codeql/codeql-language-guides/analyzing-data-flow-in-go.rst | 2 +- .../codeql-language-guides/analyzing-data-flow-in-java.rst | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/docs/codeql/codeql-language-guides/analyzing-data-flow-in-csharp.rst b/docs/codeql/codeql-language-guides/analyzing-data-flow-in-csharp.rst index cffc6eab674a..7e60956a5a98 100644 --- a/docs/codeql/codeql-language-guides/analyzing-data-flow-in-csharp.rst +++ b/docs/codeql/codeql-language-guides/analyzing-data-flow-in-csharp.rst @@ -103,7 +103,7 @@ Unfortunately this will only give the expression in the argument, not the values and DataFlow::localFlow(DataFlow::exprNode(src), DataFlow::exprNode(call.getArgument(0))) select src -Then we can make the source more specific, for example an access to a public parameter. This query finds instances where a public parameter is used to open a file: +To restrict sources to only an access to a public parameter, rather than arbitrary expressions, we can modify this query as follows: .. code-block:: ql diff --git a/docs/codeql/codeql-language-guides/analyzing-data-flow-in-go.rst b/docs/codeql/codeql-language-guides/analyzing-data-flow-in-go.rst index f2fc0d9ec78f..537a2308203f 100644 --- a/docs/codeql/codeql-language-guides/analyzing-data-flow-in-go.rst +++ b/docs/codeql/codeql-language-guides/analyzing-data-flow-in-go.rst @@ -117,7 +117,7 @@ Unfortunately, this only gives the expression in the argument, not the values wh DataFlow::localFlow(DataFlow::exprNode(src), DataFlow::exprNode(call.getArgument(0))) select src -Then we can make the source more specific, for example an access to a parameter. This query finds where a public parameter is passed to ``os.Open(..)``: +To restrict sources to only parameters, rather than arbitrary expressions, we can modify this query as follows: .. code-block:: ql diff --git a/docs/codeql/codeql-language-guides/analyzing-data-flow-in-java.rst b/docs/codeql/codeql-language-guides/analyzing-data-flow-in-java.rst index effac8791921..bade378d3a07 100644 --- a/docs/codeql/codeql-language-guides/analyzing-data-flow-in-java.rst +++ b/docs/codeql/codeql-language-guides/analyzing-data-flow-in-java.rst @@ -122,7 +122,7 @@ Unfortunately, this only gives the expression in the argument, not the values wh DataFlow::localFlow(DataFlow::exprNode(src), DataFlow::exprNode(call.getArgument(0))) select src -Then we can make the source more specific, for example an access to a public parameter. This query finds where a public parameter is passed to ``new FileReader(..)``: +To restrict sources to only an access to a public parameter, rather than arbitrary expressions, we can modify this query as follows: .. code-block:: ql