@@ -250,26 +250,26 @@ if the Intent carries data that is tainted (2nd order injection)`;
250250 }
251251 }
252252
253- // write a code to traverse directory recursively and get all java files
254- const directoryPath =
255- 'C:\\Users\\Shiva\\AndroidStudioProjects\\DEVAAVulnerableApp'
256- let javaFiles = [ ]
257- javaFiles = getJavaFiles ( directoryPath )
258- // console.log(javaFiles)
259-
260- for ( const javaFile of javaFiles ) {
261- // read file using fs
262- // const file = fs.readFileSync(javaFile, "utf8");
263- // // console.log(file);
264- // const cst = parse(file);
265- // // console.log(cst);
266- // const methodcollector = new MethodCollector();
267- // // The CST result from the previous code snippet
268- // methodcollector.visit(cst);
269- // methodcollector.customResult.forEach((arrowOffset) => {
270- // console.log(arrowOffset);
271- // });
272- }
253+ // // write a code to traverse directory recursively and get all java files
254+ // const directoryPath =
255+ // 'C:\\Users\\Shiva\\AndroidStudioProjects\\DEVAAVulnerableApp'
256+ // let javaFiles = []
257+ // javaFiles = getJavaFiles(directoryPath)
258+ // // console.log(javaFiles)
259+
260+ // for (const javaFile of javaFiles) {
261+ // // read file using fs
262+ // // const file = fs.readFileSync(javaFile, "utf8");
263+ // // // console.log(file);
264+ // // const cst = parse(file);
265+ // // // console.log(cst);
266+ // // const methodcollector = new MethodCollector();
267+ // // // The CST result from the previous code snippet
268+ // // methodcollector.visit(cst);
269+ // // methodcollector.customResult.forEach((arrowOffset) => {
270+ // // console.log(arrowOffset);
271+ // // });
272+ // }
273273 }
274274
275275 checkManifestIssue ( exported_tag : string , tag : any ) : void {
0 commit comments