From e456c6e18ce47279d429b38f0b348e1a5f2b2beb Mon Sep 17 00:00:00 2001 From: Tavian Barnes Date: Mon, 23 Sep 2024 11:41:52 -0400 Subject: Fix spelling --- docs/SECURITY.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'docs/SECURITY.md') diff --git a/docs/SECURITY.md b/docs/SECURITY.md index 7bcb5e6..dd3277a 100644 --- a/docs/SECURITY.md +++ b/docs/SECURITY.md @@ -16,7 +16,7 @@ Anyone with enough control over the command line of `bfs` or any `find`-compatib > It is *always* unsafe to allow *any* other part of the command line to be affected by untrusted input. > Use the `-f` flag, or `-files0-from`, to ensure that the input is interpreted as a path. -This still has security implications, incuding: +This still has security implications, including: - **Information disclosure:** an attacker may learn whether particular files exist by observing `bfs`'s output, exit status, or even side channels like execution time. - **Denial of service:** large directory trees or slow/network storage may cause `bfs` to consume excessive system resources. -- cgit v1.2.3