Skip to content

Latest commit

 

History

History
5 lines (3 loc) · 426 Bytes

File metadata and controls

5 lines (3 loc) · 426 Bytes

7.7.2

Minor Analysis Improvements

  • Fields of certain objects are considered tainted if the object is tainted. This holds, for example, for objects that occur directly as sources in the active threat model (for instance, a remote flow source). This has now been amended to also include array types, such that if an array like MyPojo[] is a source, then fields of a tainted MyPojo are now also considered tainted.