Skip to content

Commit cabcc58

Browse files
authored
JavaScript workshop: Update links
1 parent 10e0523 commit cabcc58

1 file changed

Lines changed: 4 additions & 0 deletions

File tree

javascript.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -366,11 +366,15 @@ select sink, source, sink, "Potential XSS vulnerability in plugin."
366366
select sink, source, sink, "Potential XSS vulnerability in plugin."
367367
```
368368
</details>
369+
370+
We have created a query from scratch to find this problem. A production version of this query can be found as part of the default set of CodeQL security queries: [UnsafeJQueryPlugin.ql](https://github.com/github/codeql/blob/master/javascript/ql/src/Security/CWE-079/UnsafeJQueryPlugin.ql). You can [see the results on a vulnerable copy of Bootstrap](https://lgtm.com/projects/g/esbena/bootstrap-pre-27047?mode=tree&ruleFocus=1511421786841) that has been analyzed on LGTM.com, our free open source analysis platform.
369371
370372
## What's next?
371373
- Read the [tutorial on analyzing data flow in JavaScript and TypeScript](https://help.semmle.com/QL/learn-ql/javascript/dataflow.html).
372374
- Try out the latest CodeQL Capture-the-Flag challenge on the [GitHub Security Lab website](https://securitylab.github.com/ctf) for a chance to win a prize! Or try one of the older Capture-the-Flag challenges to improve your CodeQL skills.
373375
- Try out a CodeQL course on [GitHub Learning Lab](https://lab.github.com/githubtraining/codeql-u-boot-challenge-(cc++)).
376+
- Read about more vulnerabilities found using CodeQL on the [GitHub Security Lab research blog](https://securitylab.github.com/research).
377+
- Explore the [open-source CodeQL queries and libraries](https://github.com/github/codeql/blob/master/CONTRIBUTING.md), and [learn how to contribute a new query](https://github.com/github/codeql/blob/master/CONTRIBUTING.md).
374378
375379
## Acknowledgements
376380

0 commit comments

Comments
 (0)