From 3f832483fc51cf04d6d00b7a37b625f9a342235b Mon Sep 17 00:00:00 2001 From: cokeBeer Date: Mon, 5 Sep 2022 22:49:24 +0800 Subject: [PATCH] update README.md --- README.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 66dddbe..4521aa2 100644 --- a/README.md +++ b/README.md @@ -92,7 +92,7 @@ You can see key `fmt.Sprintf` holds the value `[[0,1]]` ``` This means the first parameter's taint and the second parameter's taint are passed to the first return value\ Also, you will get a `callgraph.json` in the same directory\ -You can see the json file contains taint from one call parameter to another call parameter +You can see the json file contains taint edges from one call parameter to another call parameter ```json { "(*github.com/cokeBeer/goot/pkg/bench.cleaner).startProcessing#0#(*os/exec.Cmd).StdoutPipe#0": { @@ -107,6 +107,7 @@ You can see the json file contains taint from one call parameter to another call } } ``` +This means there is a taint edge from position `0` of `startProcessing` (in this case, the parameter is the receiver `bench.cleaner` itself ) to position `0` of `StdoutPipe` (in this case, the parameter is ther reciver `exec.Cmd` iteself, too) ## Use as a framework @@ -178,7 +179,7 @@ And you can learn **how to run** an analysis from `cmd` package ## Presentation This is the output of `cmd/constantpropagationanalysis`\ -The first part is the ssa and the second part is the constant propagation on ssa +The first part is the SSA format of the source code and the second part is the constant propagation on SSA ``` # Name: constantpropagtionanalysis.Hello # Package: constantpropagtionanalysis