mirror of
https://github.com/danog/psalm.git
synced 2024-12-03 10:07:52 +01:00
Doc typo
This commit is contained in:
parent
5095f4eb85
commit
7be610ef8c
@ -1,6 +1,6 @@
|
|||||||
# TaintedEval
|
# TaintedEval
|
||||||
|
|
||||||
Emitted when user-controlled input can be passed into to an `eval` call.
|
Emitted when user-controlled input can be passed into an `eval` call.
|
||||||
|
|
||||||
Passing untrusted user input to `eval` calls is dangerous, as it allows arbitrary data to be executed on your server.
|
Passing untrusted user input to `eval` calls is dangerous, as it allows arbitrary data to be executed on your server.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# TaintedHtml
|
# TaintedHtml
|
||||||
|
|
||||||
Emitted when user-controlled input that can contain HTML can be passed into to an `echo` statement.
|
Emitted when user-controlled input that can contain HTML can be passed into an `echo` statement.
|
||||||
|
|
||||||
## Risk
|
## Risk
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# TaintedInclude
|
# TaintedInclude
|
||||||
|
|
||||||
Emitted when user-controlled input can be passed into to an `include` or `require` expression.
|
Emitted when user-controlled input can be passed into an `include` or `require` expression.
|
||||||
|
|
||||||
Passing untrusted user input to `include` calls is dangerous, as it can allow an attacker to execute arbitrary scripts on your server.
|
Passing untrusted user input to `include` calls is dangerous, as it can allow an attacker to execute arbitrary scripts on your server.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# TaintedShell
|
# TaintedShell
|
||||||
|
|
||||||
Emitted when user-controlled input can be passed into to an `exec` call or similar.
|
Emitted when user-controlled input can be passed into an `exec` call or similar.
|
||||||
|
|
||||||
```php
|
```php
|
||||||
<?php
|
<?php
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# TaintedSql
|
# TaintedSql
|
||||||
|
|
||||||
Emitted when user-controlled input can be passed into to a SQL command.
|
Emitted when user-controlled input can be passed into a SQL command.
|
||||||
|
|
||||||
```php
|
```php
|
||||||
<?php
|
<?php
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# TaintedTextWithQuotes
|
# TaintedTextWithQuotes
|
||||||
|
|
||||||
Emitted when user-controlled input that can contain quotation marks can be passed into to an `echo` statement.
|
Emitted when user-controlled input that can contain quotation marks can be passed into an `echo` statement.
|
||||||
|
|
||||||
## Risk
|
## Risk
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# TaintedXpath
|
# TaintedXpath
|
||||||
|
|
||||||
Emitted when user-controlled input can be passed into to a xpath query.
|
Emitted when user-controlled input can be passed into a xpath query.
|
||||||
|
|
||||||
```php
|
```php
|
||||||
<?php
|
<?php
|
||||||
|
Loading…
Reference in New Issue
Block a user