mirror of
https://github.com/danog/psalm.git
synced 2024-12-02 09:37:59 +01:00
Doc typo
This commit is contained in:
parent
5095f4eb85
commit
7be610ef8c
@ -1,6 +1,6 @@
|
||||
# TaintedEval
|
||||
|
||||
Emitted when user-controlled input can be passed into to an `eval` call.
|
||||
Emitted when user-controlled input can be passed into an `eval` call.
|
||||
|
||||
Passing untrusted user input to `eval` calls is dangerous, as it allows arbitrary data to be executed on your server.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
# TaintedHtml
|
||||
|
||||
Emitted when user-controlled input that can contain HTML can be passed into to an `echo` statement.
|
||||
Emitted when user-controlled input that can contain HTML can be passed into an `echo` statement.
|
||||
|
||||
## Risk
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
# TaintedInclude
|
||||
|
||||
Emitted when user-controlled input can be passed into to an `include` or `require` expression.
|
||||
Emitted when user-controlled input can be passed into an `include` or `require` expression.
|
||||
|
||||
Passing untrusted user input to `include` calls is dangerous, as it can allow an attacker to execute arbitrary scripts on your server.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
# TaintedShell
|
||||
|
||||
Emitted when user-controlled input can be passed into to an `exec` call or similar.
|
||||
Emitted when user-controlled input can be passed into an `exec` call or similar.
|
||||
|
||||
```php
|
||||
<?php
|
||||
|
@ -1,6 +1,6 @@
|
||||
# TaintedSql
|
||||
|
||||
Emitted when user-controlled input can be passed into to a SQL command.
|
||||
Emitted when user-controlled input can be passed into a SQL command.
|
||||
|
||||
```php
|
||||
<?php
|
||||
|
@ -1,6 +1,6 @@
|
||||
# TaintedTextWithQuotes
|
||||
|
||||
Emitted when user-controlled input that can contain quotation marks can be passed into to an `echo` statement.
|
||||
Emitted when user-controlled input that can contain quotation marks can be passed into an `echo` statement.
|
||||
|
||||
## Risk
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
# TaintedXpath
|
||||
|
||||
Emitted when user-controlled input can be passed into to a xpath query.
|
||||
Emitted when user-controlled input can be passed into a xpath query.
|
||||
|
||||
```php
|
||||
<?php
|
||||
|
Loading…
Reference in New Issue
Block a user