Skip to content

Commit

Permalink
Merge pull request #399 from lunasec-io/fix-typos-jan
Browse files Browse the repository at this point in the history
Fix typos in docs
  • Loading branch information
freeqaz authored Jan 4, 2022
2 parents 973a6c4 + 432e4b3 commit 32a4cec
Show file tree
Hide file tree
Showing 5 changed files with 6 additions and 4 deletions.
2 changes: 1 addition & 1 deletion .pnp.loader.mjs

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Binary file modified .yarn/install-state.gz
Binary file not shown.
2 changes: 2 additions & 0 deletions docs/blog/2021-12-22-story-lunasec.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,8 @@ We want to make it known that there *are* ways to protect data against attacks l
we've been building an Open Source framework to make it so these vulnerabilities, even full RCEs like Log4Shell, can't leak the sensitive data
that attackers are really after. It feels more relevant now than ever.

<!--truncate-->

## Modern attack surface
In security, we use the word "attack surface" to talk about how much territory we need to defend.
I think of this like the walls and gates around an ancient city. The bigger
Expand Down
4 changes: 2 additions & 2 deletions docs/blog/2021-12-28-log4j-hype-train.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -34,8 +34,8 @@ in `2.16.0` and log4j was updated to `2.17.0` to fix it, another
even *less* impactful [vulnerability](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832) was discovered in
`2.17.0`. I wonder if we should say "vulnerability" in quotes because
this latest vulnerability requires an attacker to have access to the
logger configuration file, which is a very privileged and unlikely scenario. It's so minor, we have chosen not to even
flag this version it in our [log4shell scanning tool](/blog/log4j-zero-day-mitigation-guide). We hope the focus will remain on fixing
logger configuration file, which is a very privileged and unlikely scenario. It's so minor, we have chosen not to
scan for it in our [log4shell scanning tool](/blog/log4j-zero-day-mitigation-guide). We hope the focus will remain on fixing
the far more critical vulnerabilities in earlier versions.

In this post, we'll look at the motivations and repercussions of hyping up this far less serious attack vector. Then,
Expand Down
2 changes: 1 addition & 1 deletion docs/typedoc-sidebar.js
Original file line number Diff line number Diff line change
Expand Up @@ -14,4 +14,4 @@
* limitations under the License.
*
*/
module.exports=[{type:'autogenerated',dirName:'cli-config'}];
module.exports=[{type:'autogenerated',dirName:'react-sdk'}];

0 comments on commit 32a4cec

Please sign in to comment.