Skip to content

Commit 5aa7135

Browse files
JarLobasgerf
andauthored
Update javascript/ql/src/Security/CWE-094/ExpressionInjection.qhelp
Co-authored-by: Asger F <[email protected]>
1 parent 1ad23c5 commit 5aa7135

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

javascript/ql/src/Security/CWE-094/ExpressionInjection.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
The best practice to avoid code injection vulnerabilities
2222
in GitHub workflows is to set the untrusted input value of the expression
2323
to an intermediate environment variable and then use the environment variable
24-
using the native syntax of the shell/script interpreter (i.e. <b>NOT</b> the <i>${{ env.VAR }}</i>).
24+
using the native syntax of the shell/script interpreter (that is, not <i>${{ env.VAR }}</i>).
2525
</p>
2626
<p>
2727
It is also recommended to limit the permissions of any tokens used

0 commit comments

Comments
 (0)