Skip to content

Commit 80ab3c7

Browse files
committed
fixup! doc: clarify threat model for application-level API exposure
1 parent aee4275 commit 80ab3c7

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

SECURITY.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -325,7 +325,7 @@ the community they pose.
325325
execution, causing crashes or use-after-free conditions).
326326
* Exposing `child_process.exec()` or similar APIs to untrusted users without
327327
proper input validation, allowing command injection.
328-
* Allowing untrusted users to control file paths passed to filesystem APIs
328+
* Allowing untrusted users to control file paths passed to file system APIs
329329
without validation, leading to path traversal issues.
330330
* Permitting untrusted users to define custom code that executes with the
331331
application's privileges (e.g., custom transforms, plugins, or callbacks).

0 commit comments

Comments
 (0)