Module BrokenCryptoAlgorithmConfig
A taint tracking configuration for sensitive information in broken or weak cryptographic algorithms.
This configuration identifies flows from Sources, which are sources of
sensitive data, to Sinks, which is an abstract class representing all
the places sensitive data may used in broken or weak cryptographic algorithms. Additional sources or sinks can be
added either by extending the relevant class, or by subclassing this configuration itself,
and amending the sources and sinks.
Import path
import semmle.javascript.security.dataflow.BrokenCryptoAlgorithmQueryPredicates
| getASelectedSinkLocation | Gets a location that will be associated with the given |
| isBarrier | Holds if data flow through |
| isSink | Holds if |
| isSource | Holds if |
| observeDiffInformedIncrementalMode | Holds if sources and sinks should be filtered to only include those that may lead to a flow path with either a source or a sink in the location range given by |