-
Notifications
You must be signed in to change notification settings - Fork 1.7k
False positive: Go / MongoDB Find method #19537
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hi @yogurt-ui Thank you for this false positive report. Resolving this issue is not a current product priority, but we acknowledge the report and will track it internally for future consideration, or if we observe repeated instances of the same problem. |
@yogurt-ui I would like to make sure that we understand your issue. I assume |
|
Are you saying that if the second argument of It might help if you could point me to a FP detected by code scanning, if there is one publicly visible. |
Description of the false positive
Code samples or links to source code
https://github.com/github/codeql/blob/dc440aaee6695deb0d9676b87e06ea984e1b4ae5/go/ql/src/Security/CWE-089/SqlInjection/
The following code has a large number of vulnerability false positives in the case of a MongoDB database.
The current MongoDB parameters have defined specific data types, and there are no injection vulnerabilities.
-->
The text was updated successfully, but these errors were encountered: