Small edits to release notes

This commit is contained in:
Sergey
2016-12-16 10:46:56 -08:00
committed by Andreas Dangel
parent 2b8f1c559b
commit 6ea28811f4

View File

@@ -38,16 +38,16 @@ to detect most common security problems.
##### ApexBadCrypto
The rule makes sure you are using randomly generated IVs and keys for `Crypto` calls.
Hard-wiring these values greatly compromise the security of encrypted data.
Hard-wiring these values greatly compromises the security of encrypted data.
For instance, it would report violations on code such as:
```
public class without sharing Foo {
Blob hardCodedIV = Blob.valueOf('Hardcoded IV 123');
Blob key = Crypto.generateAesKey(128);
Blob hardCodedKey = Blob.valueOf('0000000000000000');
Blob data = Blob.valueOf('Data to be encrypted');
Blob encrypted = Crypto.encrypt('AES128', key, hardCodedIV, data);
Blob encrypted = Crypto.encrypt('AES128', hardCodedKey, hardCodedIV, data);
}
```
@@ -55,8 +55,8 @@ public class without sharing Foo {
##### ApexCRUDViolation
The rule validates you are checking for access permissions before a SOQL/SOSL/DML operation.
Not having proper permissions will produce runtime errors. This check forces you to handle
such scenarios.
Since Apex runs in system mode not having proper permissions checks results in escalation of
privilege and may produce runtime errors. This check forces you to handle such scenarios.
For example, the following code is considered valid:
@@ -104,7 +104,7 @@ For the time being, it reports:
* Against `FinancialForce`'s `Configuration.disableTriggerCRUDSecurity()`. Disabling CRUD security
opens the door to several attacks and requires manual validation, which is unreliable.
* Calling `System.debug` passing sensible data as parameter, which could lead to exposure
* Calling `System.debug` passing sensitive data as parameter, which could lead to exposure
of private data.
##### ApexInsecureEndpoint
@@ -130,7 +130,7 @@ public class without sharing Foo {
##### ApexSharingViolations
Detect classes declared with no explicit sharing mode if DML methods are used. This
Detect classes declared without explicit sharing mode if DML methods are used. This
forces the developer to take access restrictions into account before modifying objects.
##### ApexSOQLInjection
@@ -165,7 +165,7 @@ For more information, you can check [this](https://developer.salesforce.com/docs
##### ApexXSSFromEscapeFalse
Reports on calls to `addError` disabling escaping. The message passed to `addError`
Reports on calls to `addError` with disabled escaping. The message passed to `addError`
will be displayed directly to the user in the UI, making it prime ground for XSS
attacks if unescaped.