From f181abf01ff9187c8ed36ed03ecb3863fc017292 Mon Sep 17 00:00:00 2001 From: xMartin Date: Sat, 24 Mar 2018 15:22:34 +0100 Subject: [PATCH] fix typos in security docs --- developer_manual/general/security.rst | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/developer_manual/general/security.rst b/developer_manual/general/security.rst index e8dc12c16..36b55d18c 100644 --- a/developer_manual/general/security.rst +++ b/developer_manual/general/security.rst @@ -25,7 +25,7 @@ To prevent this, always use prepared queries: $params = array(1); $result = $query->execute($params); -If the App Framework is used, write SQL queries like this in the a class that extends the Mapper: +If the App Framework is used, write SQL queries like this in a class that extends the Mapper: .. code-block:: php @@ -107,7 +107,7 @@ Clickjacking To prevent such attacks Nextcloud sends the `X-Frame-Options` header to all template responses. Don't remove this header if you don't really need it! -This is already built into Nextcloud if :php:class:`OC_Template`. +This is already built into Nextcloud in :php:class:`OC_Template`. Code executions / file inclusions --------------------------------- @@ -136,7 +136,7 @@ Code executions and file inclusions can be easily prevented by **never** allowin Directory traversal ------------------- -Very often developers forget about sanitizing the file path (removing all \\ and /), this allows an attacker to traverse through directories on the server which opens several potential attack vendors including privilege escalations, code executions or file disclosures. +Very often developers forget about sanitizing the file path (removing all \\ and /), this allows an attacker to traverse through directories on the server which opens several potential attack vectors including privilege escalations, code executions or file disclosures. **DON'T**