@@ -6365,7 +6365,7 @@ <h4>Inappropriate Use</h4>
6365
6365
< h3 > Code Injection</ h3 >
6366
6366
6367
6367
< p >
6368
- It is possible to include data in [=verifiable credentials=] that include
6368
+ It is possible for data in [=verifiable credentials=] to include
6369
6369
executable code or scripting languages. Authors of verifiable credentials are
6370
6370
advised to avoid doing so, unless necessary, and the risks have been mitigated
6371
6371
to the extent possible.
@@ -6376,35 +6376,35 @@ <h3>Code Injection</h3>
6376
6376
or annotations, the contents of the string might require additional structure or
6377
6377
markup in order to be presented correctly. It is possible to use markup
6378
6378
languages, such as HTML, to label spans of text in different languages or to
6379
- supply string-internal markup needed for proper display of [=bidirectional
6379
+ supply string-internal markup needed for the proper display of [=bidirectional
6380
6380
text=]. It is also possible to use the `rdf:HTML` datatype to encode such values
6381
6381
accurately in JSON-LD.
6382
6382
</ p >
6383
6383
6384
6384
< p >
6385
6385
Despite the ability to encode information as HTML, implementers are strongly
6386
- discouraged from doing this because it :
6386
+ discouraged from doing so, for the following reasons :
6387
6387
</ p >
6388
-
6388
+
6389
6389
< ul >
6390
6390
< li >
6391
- Requires some version of an HTML processor, which increases the burden of
6391
+ It requires some version of an HTML processor, which increases the burden of
6392
6392
processing language and base direction information.
6393
6393
</ li >
6394
6394
< li >
6395
- Increases the security attack surface when utilizing this data model because
6396
- naively processing HTML could result in executing a `script` tag that
6395
+ It increases the security attack surface when utilizing this data model, because
6396
+ naively processing HTML could result in the execution of a `script` tag that
6397
6397
an attacker injected at some point during the data production process.
6398
6398
</ li >
6399
6399
</ ul >
6400
6400
6401
6401
< p >
6402
6402
If implementers feel they need to use HTML, or other markup languages capable of
6403
6403
containing executable scripts, to address a specific use case, they are advised
6404
- to analyze how an attacker would use the markup to mount injection attacks
6405
- against a consumer of the markup and then deploy mitigations against the
6406
- identified attacks such as running the HTML rendering engine in a sandbox with
6407
- no ability to have access to the network.
6404
+ to analyze how an attacker could use the markup to mount injection attacks
6405
+ against a consumer of the markup, and then deploy mitigations against the
6406
+ identified attacks, such as running the HTML rendering engine in a sandbox with
6407
+ no ability to access the network.
6408
6408
</ p >
6409
6409
</ section >
6410
6410
0 commit comments