Skip to content

Commit b4b40a2

Browse files
authored
Merge pull request #21 from ro-tex/fix_typos
Fix a couple of typos and remove an unused constant.
2 parents 8bed8a2 + 3f6afb5 commit b4b40a2

File tree

4 files changed

+4
-5
lines changed

4 files changed

+4
-5
lines changed

docs/rules/g104_unchecked_erros.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: g104
33
title: G104: Audit errors not checked
44
---
55

6-
Really useful feature of Golang is the ability to return a tuple of a result and an error value from a function. There is an unspoken rule in Golang that the result of a function is unsafe until you make check the error value. Many security exploits can be performed when the error value is not checked.
6+
A really useful feature of Golang is the ability to return a tuple of a result and an error value from a function. There is an unspoken rule in Golang that the result of a function is unsafe until you make check the error value. Many security exploits can be performed when the error value is not checked.
77

88
## Example code:
99

docs/rules/g107_url_arg_to_http_request_as_taint_input.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,10 @@ id: g107
33
title: G107: Url provided to HTTP request as taint input
44
---
55

6-
Getting an URL from an untrusted source like user input gives the ability of an attacker to redirect your application to bad websites and perform additional attacks.
6+
Getting a URL from an untrusted source like user input gives the ability of an attacker to redirect your application to bad websites and perform additional attacks.
77
One of the examples is as shown below the [http.Get()](https://golang.org/pkg/net/http/#Client.Get) function issues a GET to the specified URL and if the result is appropriate GET will follow the redirect after calling Client's CheckRedirect function. That means that the attacker can send your application to various places.
88

9-
This problem can be used to achieve [SSRF](https://www.acunetix.com/blog/articles/server-side-request-forgery-vulnerability/) atttacks via http requests with variable url.
9+
This problem can be used to achieve [SSRF](https://www.acunetix.com/blog/articles/server-side-request-forgery-vulnerability/) attacks via http requests with variable url.
1010

1111
## Example problematic code:
1212

docs/rules/g304_file-path_provided_as_taint_input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: g304
33
title: G304: File path provided as taint input
44
---
55

6-
Trying to open a file provided as an input in a variable. The content of this variable might be controlled by an attacker who could change it to hold unauthorised file paths form the system. In this way, it is possible to exfiltrate confidential information or such.
6+
Trying to open a file provided as an input in a variable. The content of this variable might be controlled by an attacker who could change it to hold unauthorised file paths from the system. In this way, it is possible to exfiltrate confidential information or such.
77

88
## Example problematic code:
99

website/core/Footer.js

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ class Footer extends React.Component {
1919
}
2020

2121
render() {
22-
const currentYear = new Date().getFullYear();
2322
return (
2423
<footer className="nav-footer" id="footer">
2524
<section className="sitemap">

0 commit comments

Comments
 (0)