diff --git a/javascript/ql/src/Security/CWE-078/UnsafeShellCommandConstruction.qhelp b/javascript/ql/src/Security/CWE-078/UnsafeShellCommandConstruction.qhelp index 0806201ce0e..1cfc41343d9 100644 --- a/javascript/ql/src/Security/CWE-078/UnsafeShellCommandConstruction.qhelp +++ b/javascript/ql/src/Security/CWE-078/UnsafeShellCommandConstruction.qhelp @@ -8,7 +8,7 @@ Dynamically constructing a shell command with inputs from exported functions, may inadvertently change the meaning of the shell command. - Clients using the exported function may use inputs that contains + Clients using the exported function may use inputs containing characters that the shell interprets in a special way, for instance quotes and spaces. diff --git a/javascript/ql/src/semmle/javascript/dataflow/TaintTracking.qll b/javascript/ql/src/semmle/javascript/dataflow/TaintTracking.qll index 0bc4a598394..5e7bf0f4d33 100644 --- a/javascript/ql/src/semmle/javascript/dataflow/TaintTracking.qll +++ b/javascript/ql/src/semmle/javascript/dataflow/TaintTracking.qll @@ -779,7 +779,7 @@ module TaintTracking { class AdHocWhitelistCheckSanitizer extends SanitizerGuardNode, DataFlow::CallNode { AdHocWhitelistCheckSanitizer() { getCalleeName() - .regexpMatch("(?i).*((?