|
39 | 39 |
|
40 | 40 | | **Query** | **Expected impact** | **Change** |
|
41 | 41 | |--------------------------------|------------------------------|---------------------------------------------------------------------------|
|
42 |
| -| Incomplete string escaping or encoding (`js/incomplete-sanitization`) | Fewer false positive results | This rule now recognizes additional ways delimiters can be stripped away. | |
43 | 42 | | Client-side cross-site scripting (`js/xss`) | More results, fewer false positive results | More potential vulnerabilities involving functions that manipulate DOM attributes are now recognized, and more sanitizers are detected. |
|
44 | 43 | | Code injection (`js/code-injection`) | More results | More potential vulnerabilities involving functions that manipulate DOM event handler attributes are now recognized. |
|
45 | 44 | | Hard-coded credentials (`js/hardcoded-credentials`) | Fewer false positive results | This rule now flags fewer password examples. |
|
46 | 45 | | Illegal invocation (`js/illegal-invocation`) | Fewer false positive results | This rule now correctly handles methods named `call` and `apply`. |
|
| 46 | +| Incomplete string escaping or encoding (`js/incomplete-sanitization`) | Fewer false positive results | This rule now recognizes additional ways delimiters can be stripped away. | |
47 | 47 | | Incorrect suffix check (`js/incorrect-suffix-check`) | Fewer false positive results | The query recognizes valid checks in more cases. |
|
48 | 48 | | Network data written to file (`js/http-to-file-access`) | Fewer false positive results | This query has been renamed to better match its intended purpose, and now only considers network data untrusted. |
|
49 | 49 | | Password in configuration file (`js/password-in-configuration-file`) | Fewer false positive results | This rule now flags fewer password examples. |
|
|
67 | 67 |
|
68 | 68 | The following queries (deprecated since 1.17) are no longer available in the distribution:
|
69 | 69 |
|
| 70 | +* Bad parity check (js/incomplete-parity-check) |
70 | 71 | * Builtin redefined (js/builtin-redefinition)
|
| 72 | +* Call to parseInt without radix (js/parseint-without-radix) |
71 | 73 | * Inefficient method definition (js/method-definition-in-constructor)
|
72 |
| -* Bad parity check (js/incomplete-parity-check) |
73 |
| -* Potentially misspelled property or variable name (js/wrong-capitalization) |
74 |
| -* Unknown JSDoc tag (js/jsdoc/unknown-tag-type) |
75 | 74 | * Invalid JSLint directive (js/jslint/invalid-directive)
|
76 | 75 | * Malformed JSLint directive (js/jslint/malformed-directive)
|
77 |
| -* Use of HTML comments (js/html-comment) |
78 | 76 | * Multi-line string literal (js/multi-line-string)
|
79 | 77 | * Octal literal (js/octal-literal)
|
| 78 | +* Potentially misspelled property or variable name (js/wrong-capitalization) |
80 | 79 | * Reserved word used as variable name (js/use-of-reserved-word)
|
81 | 80 | * Trailing comma in array or object expressions (js/trailing-comma-in-array-or-object)
|
82 |
| -* Call to parseInt without radix (js/parseint-without-radix) |
| 81 | +* Unknown JSDoc tag (js/jsdoc/unknown-tag-type) |
| 82 | +* Use of HTML comments (js/html-comment) |
0 commit comments