Skip to content

Commit 42aca4a

Browse files
geoffw0mchammer01
andauthored
Apply suggestions from code review
Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com>
1 parent 0675a29 commit 42aca4a

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

rust/ql/src/queries/security/CWE-295/DisabledCertificateCheck.qhelp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@
55

66
<overview>
77
<p>
8-
The <code>danger_accept_invalid_certs</code> and <code>danger_accept_invalid_hostnames</code> options on TLS connectors and HTTP clients control whether certificate and hostname verification are performed. If set to <code>true</code>, the client will accept any certificate or any host name, making it susceptible to man-in-the-middle attacks.
8+
The <code>danger_accept_invalid_certs</code> and <code>danger_accept_invalid_hostnames</code> options on TLS connectors and HTTP clients control whether certificate and hostname verification is performed. If set to <code>true</code>, the client will accept any certificate or any host name, making it susceptible to man-in-the-middle attacks.
99
</p>
1010
</overview>
1111

1212
<recommendation>
1313
<p>
14-
Do not set <code>danger_accept_invalid_certs</code> or <code>danger_accept_invalid_hostnames</code> to <code>true</code>, except in controlled environments such as tests. In production, always ensure certificate and hostname verification are enabled to prevent security risks.
14+
Do not set <code>danger_accept_invalid_certs</code> or <code>danger_accept_invalid_hostnames</code> to <code>true</code>, except in controlled environments such as tests. In production, always ensure certificate and hostname verification is enabled to prevent security risks.
1515
</p>
1616
</recommendation>
1717

rust/ql/src/queries/security/CWE-295/DisabledCertificateCheck.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/**
22
* @name Disabled TLS certificate check
3-
* @description If an application disables TLS certificate checking, it may be vulnerable to
3+
* @description An application that disables TLS certificate checking is more vulnerable to
44
* man-in-the-middle attacks.
55
* @kind path-problem
66
* @problem.severity warning

0 commit comments

Comments
 (0)