Skip to content

Commit e26578a

Browse files
mspornyTallTedDavid-Chadwick
committed
Fix grammar in code injection warning.
Co-authored-by: Ted Thibodeau Jr <[email protected]> Co-authored-by: David Chadwick <[email protected]>
1 parent 1b173df commit e26578a

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

index.html

+11-11
Original file line numberDiff line numberDiff line change
@@ -6365,7 +6365,7 @@ <h4>Inappropriate Use</h4>
63656365
<h3>Code Injection</h3>
63666366

63676367
<p>
6368-
It is possible to include data in [=verifiable credentials=] that include
6368+
It is possible for data in [=verifiable credentials=] to include
63696369
executable code or scripting languages. Authors of verifiable credentials are
63706370
advised to avoid doing so, unless necessary, and the risks have been mitigated
63716371
to the extent possible.
@@ -6376,35 +6376,35 @@ <h3>Code Injection</h3>
63766376
or annotations, the contents of the string might require additional structure or
63776377
markup in order to be presented correctly. It is possible to use markup
63786378
languages, such as HTML, to label spans of text in different languages or to
6379-
supply string-internal markup needed for proper display of [=bidirectional
6379+
supply string-internal markup needed for the proper display of [=bidirectional
63806380
text=]. It is also possible to use the `rdf:HTML` datatype to encode such values
63816381
accurately in JSON-LD.
63826382
</p>
63836383

63846384
<p>
63856385
Despite the ability to encode information as HTML, implementers are strongly
6386-
discouraged from doing this because it:
6386+
discouraged from doing so, for the following reasons:
63876387
</p>
6388-
6388+
63896389
<ul>
63906390
<li>
6391-
Requires some version of an HTML processor, which increases the burden of
6391+
It requires some version of an HTML processor, which increases the burden of
63926392
processing language and base direction information.
63936393
</li>
63946394
<li>
6395-
Increases the security attack surface when utilizing this data model because
6396-
naively processing HTML could result in executing a `script` tag that
6395+
It increases the security attack surface when utilizing this data model, because
6396+
naively processing HTML could result in the execution of a `script` tag that
63976397
an attacker injected at some point during the data production process.
63986398
</li>
63996399
</ul>
64006400

64016401
<p>
64026402
If implementers feel they need to use HTML, or other markup languages capable of
64036403
containing executable scripts, to address a specific use case, they are advised
6404-
to analyze how an attacker would use the markup to mount injection attacks
6405-
against a consumer of the markup and then deploy mitigations against the
6406-
identified attacks such as running the HTML rendering engine in a sandbox with
6407-
no ability to have access to the network.
6404+
to analyze how an attacker could use the markup to mount injection attacks
6405+
against a consumer of the markup, and then deploy mitigations against the
6406+
identified attacks, such as running the HTML rendering engine in a sandbox with
6407+
no ability to access the network.
64086408
</p>
64096409
</section>
64106410

0 commit comments

Comments
 (0)