Skip to content

Commit a781522

Browse files
authored
Copyedit documentation
1 parent 96c142b commit a781522

File tree

1 file changed

+4
-7
lines changed

1 file changed

+4
-7
lines changed

java/ql/src/experimental/Security/CWE/CWE-347/Auth0NoVerifier.qhelp

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,24 +2,21 @@
22
<qhelp>
33
<overview>
44
<p>
5-
A JSON Web Token (JWT) is used for authenticating and managing users in an application.
6-
</p>
7-
<p>
8-
Only Decoding JWTs without checking if they have a valid signature or not can lead to security vulnerabilities.
5+
A JSON Web Token (JWT) is used for authenticating and managing users in an application. It must be verified in order to ensure the JWT is genuine.
96
</p>
107

118
</overview>
129
<recommendation>
1310

1411
<p>
15-
Don't use methods that only decode JWT, Instead use methods that verify the signature of JWT.
12+
Don't use information from a JWT without verifying that JWT.
1613
</p>
1714

1815
</recommendation>
1916
<example>
2017

2118
<p>
22-
The following code you can see an Example from a popular Library.
19+
The following example illustrates secure and insecure use of the Auth0 `java-jwt` library.
2320
</p>
2421

2522
<sample src="Example.java" />
@@ -31,4 +28,4 @@
3128
</li>
3229
</references>
3330

34-
</qhelp>
31+
</qhelp>

0 commit comments

Comments
 (0)