From 9481673c07f2d3af47d55c88b5f6c38a74b84c30 Mon Sep 17 00:00:00 2001 From: Geoffrey White <40627776+geoffw0@users.noreply.github.com> Date: Thu, 15 Dec 2022 16:08:51 +0000 Subject: [PATCH] Swift: Remove temp workaround. --- swift/ql/src/queries/Security/CWE-094/UnsafeJsEval.ql | 3 --- 1 file changed, 3 deletions(-) diff --git a/swift/ql/src/queries/Security/CWE-094/UnsafeJsEval.ql b/swift/ql/src/queries/Security/CWE-094/UnsafeJsEval.ql index e553df216fee..9219b4f5f551 100644 --- a/swift/ql/src/queries/Security/CWE-094/UnsafeJsEval.ql +++ b/swift/ql/src/queries/Security/CWE-094/UnsafeJsEval.ql @@ -127,9 +127,6 @@ class UnsafeJsEvalConfig extends TaintTracking::Configuration { ) or exists(MemberRefExpr e, Expr self, VarDecl member | - self.getType().getName() = "String" and - member.getName() = ["utf8", "utf16", "utf8CString"] - or self.getType().getName().matches(["Unsafe%Buffer%", "Unsafe%Pointer%"]) and member.getName() = "baseAddress" |