Skip to content

Commit f2658a0

Browse files
apply suggestions from doc review
Co-authored-by: mc <[email protected]>
1 parent f98ff65 commit f2658a0

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

ruby/ql/src/queries/security/cwe-094/UnsafeCodeConstruction.qhelp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55

66
<overview>
77
<p>
8-
When a library function dynamically constructs code in a potentially unsafe way, then
8+
When a library function dynamically constructs code in a potentially unsafe way,
99
it's important to document to clients of the library that the function should only be
1010
used with trusted inputs.
1111

@@ -35,7 +35,7 @@ then an attacker might be able to execute arbitrary code on the system.
3535

3636
<p>
3737
To avoid this problem, either properly document that the function is potentially
38-
unsafe, or use an alternative solution such as <code>JSON.parse</code> or another library, like in the examples below,
38+
unsafe, or use an alternative solution such as <code>JSON.parse</code> or another library
3939
that does not allow arbitrary code to be executed.
4040
</p>
4141

0 commit comments

Comments
 (0)