Skip to content

Commit 4bd172a

Browse files
Apply suggestions from code review
Co-authored-by: kerem <[email protected]>
1 parent 5a53048 commit 4bd172a

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/ROOT/pages/security/securing-a-graphql-api.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -327,7 +327,7 @@ Besides authentication and authorization considerations, there are a couple of w
327327

328328
While the xref:getting-started/graphql-aura.adoc[Getting started page for GraphQL and Aura Console] advocates to both **Enable introspection** as well as **Enable field suggestions**, this is not recommended when considering security.
329329

330-
Both potentially expose information that can be used to gain insight on specifics of your GraphQL schema and execute targeted malicious opLorem ipsumerations.
330+
Both potentially expose information that can be used to gain insight on specifics of your GraphQL schema and execute targeted malicious operations.
331331
Be sure to deactivate both in a customer-facing real-life scenario.
332332

333333
[[best-practice-internal-errors]]
@@ -482,7 +482,7 @@ The link:https://shopify.dev/docs/api/usage/limits#the-leaky-bucket-algorithm[le
482482

483483
==== Query cost analysis
484484

485-
link:https://github.com/pa-bru/graphql-cost-analysis[raphql-cost-analysis]
485+
link:https://github.com/pa-bru/graphql-cost-analysis[graphql-cost-analysis]
486486

487487

488488
=== Use timeouts

0 commit comments

Comments
 (0)