From 7be610ef8c99b6a37b2499d7fcc409fd6512dcd5 Mon Sep 17 00:00:00 2001 From: cgocast Date: Wed, 22 Nov 2023 11:10:23 +0100 Subject: [PATCH] Doc typo --- docs/running_psalm/issues/TaintedEval.md | 2 +- docs/running_psalm/issues/TaintedHtml.md | 2 +- docs/running_psalm/issues/TaintedInclude.md | 2 +- docs/running_psalm/issues/TaintedShell.md | 2 +- docs/running_psalm/issues/TaintedSql.md | 2 +- docs/running_psalm/issues/TaintedTextWithQuotes.md | 2 +- docs/running_psalm/issues/TaintedXpath.md | 2 +- 7 files changed, 7 insertions(+), 7 deletions(-) diff --git a/docs/running_psalm/issues/TaintedEval.md b/docs/running_psalm/issues/TaintedEval.md index c1bce38b23f..afdf53ceeb0 100644 --- a/docs/running_psalm/issues/TaintedEval.md +++ b/docs/running_psalm/issues/TaintedEval.md @@ -1,6 +1,6 @@ # TaintedEval -Emitted when user-controlled input can be passed into to an `eval` call. +Emitted when user-controlled input can be passed into an `eval` call. Passing untrusted user input to `eval` calls is dangerous, as it allows arbitrary data to be executed on your server. diff --git a/docs/running_psalm/issues/TaintedHtml.md b/docs/running_psalm/issues/TaintedHtml.md index ff8add010c3..012a3121d80 100644 --- a/docs/running_psalm/issues/TaintedHtml.md +++ b/docs/running_psalm/issues/TaintedHtml.md @@ -1,6 +1,6 @@ # TaintedHtml -Emitted when user-controlled input that can contain HTML can be passed into to an `echo` statement. +Emitted when user-controlled input that can contain HTML can be passed into an `echo` statement. ## Risk diff --git a/docs/running_psalm/issues/TaintedInclude.md b/docs/running_psalm/issues/TaintedInclude.md index 929adb8a296..8f088dfcadf 100644 --- a/docs/running_psalm/issues/TaintedInclude.md +++ b/docs/running_psalm/issues/TaintedInclude.md @@ -1,6 +1,6 @@ # TaintedInclude -Emitted when user-controlled input can be passed into to an `include` or `require` expression. +Emitted when user-controlled input can be passed into an `include` or `require` expression. Passing untrusted user input to `include` calls is dangerous, as it can allow an attacker to execute arbitrary scripts on your server. diff --git a/docs/running_psalm/issues/TaintedShell.md b/docs/running_psalm/issues/TaintedShell.md index a91e1f1b188..5f0e2f718bc 100644 --- a/docs/running_psalm/issues/TaintedShell.md +++ b/docs/running_psalm/issues/TaintedShell.md @@ -1,6 +1,6 @@ # TaintedShell -Emitted when user-controlled input can be passed into to an `exec` call or similar. +Emitted when user-controlled input can be passed into an `exec` call or similar. ```php