We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 1ad23c5 commit 5aa7135Copy full SHA for 5aa7135
javascript/ql/src/Security/CWE-094/ExpressionInjection.qhelp
@@ -21,7 +21,7 @@
21
The best practice to avoid code injection vulnerabilities
22
in GitHub workflows is to set the untrusted input value of the expression
23
to an intermediate environment variable and then use the environment variable
24
- using the native syntax of the shell/script interpreter (i.e. <b>NOT</b> the <i>${{ env.VAR }}</i>).
+ using the native syntax of the shell/script interpreter (that is, not <i>${{ env.VAR }}</i>).
25
</p>
26
<p>
27
It is also recommended to limit the permissions of any tokens used
0 commit comments