Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ for _, result := range results {
queryArgs := queryEdge.Site.Common().Args[1:]

// Skip the context argument, if using a *Context query variant.
if strings.HasPrefix(queryEdge.Site.Value().Call.Value.String(), "Context") {
if strings.HasSuffix(queryEdge.Site.Value().Call.Value.String(), "Context") {
queryArgs = queryArgs[1:]
}

Expand All @@ -68,7 +68,7 @@ for _, result := range results {

### `taint`

The `taint` CLI is a an interactive tool to find potential security vulnerabilities. Can be used
The `taint` CLI is an interactive tool to find potential security vulnerabilities. It can be used
to find potential SQL injections, log injections, and cross-site scripting (XSS) vulnerabilities,
among other types of vulnerabilities.

Expand Down Expand Up @@ -159,7 +159,7 @@ func main() {
http.ListenAndServe(":8080", nil)
}
$ logi main.go
./log/injection/testdata/src/example/main.go:10:14: potential log injection
./log/injection/testdata/src/a/main.go:10:14: potential log injection
```

### `xss`
Expand Down Expand Up @@ -187,5 +187,5 @@ func main() {
http.ListenAndServe(":8080", nil)
}
$ xss main.go
./xss/testdata/src/example/main.go:9:8: potential XSS
./xss/testdata/src/a/main.go:9:10: potential XSS
```