Skip to content

Commit be47995

Browse files
authored
Merge pull request #257 from JarLob/main
fix java -> javascript
2 parents c637fd4 + b146305 commit be47995

2 files changed

Lines changed: 2 additions & 2 deletions

File tree

CodeQL_Queries/actions/pull_request_target.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
* @description Workflows triggered on `pull_request_target` have read/write tokens for the base repository and the access to secrets.
44
* By explicitly checking out and running the build script from a fork the untrusted code is running in an environment
55
* that is able to push to the base repository and to access secrets.
6-
* @id java/actions/pull_request_target
6+
* @id javascript/actions/pull_request_target
77
* @kind problem
88
* @problem.severity warning
99
*/

CodeQL_Queries/actions/script_injections.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
* @name Command injection from user-controlled Actions context
33
* @description Using user-controlled GitHub Actions contexts in a command line may allow a malicious
44
* user to change the meaning of the command.
5-
* @id java/actions/command-injection
5+
* @id javascript/actions/command-injection
66
* @kind problem
77
* @problem.severity error
88
*/

0 commit comments

Comments
 (0)