Skip to content

Commit eeb938a

Browse files
committed
Docs: Minor fixes for Actions query help
1 parent 32f191c commit eeb938a

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

actions/ql/src/Security/CWE-077/EnvVarInjectionMedium.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ An attacker could craft a malicious artifact that writes dangerous environment v
109109
110110
### Exploitation
111111
112-
An attacker is be able to run arbitrary code by injecting environment variables such as `LD_PRELOAD`, `BASH_ENV`, etc.
112+
An attacker would be able to run arbitrary code by injecting environment variables such as `LD_PRELOAD`, `BASH_ENV`, etc.
113113
114114
## References
115115

actions/ql/src/Security/CWE-312/UnmaskedSecretExposure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22

33
## Description
44

5-
Secrets derived from other secrets are not know to the workflow runner and therefore not masked unless explicitly registered.
5+
Secrets derived from other secrets are not known to the workflow runner, and therefore are not masked unless explicitly registered.
66

77
## Recommendations
88

9-
Avoid defining non-plain secrets. For example, do not define a new secret containing a JSON object and then read properties out of it from the workflow since these read values will not be masked by the workflow runner.
9+
Avoid defining non-plain secrets. For example, do not define a new secret containing a JSON object and then read properties out of it from the workflow, since these read values will not be masked by the workflow runner.
1010

1111
## Examples
1212

0 commit comments

Comments
 (0)