From 34efed3df8764286458434c204c67e39dd71755d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Cl=C3=A9ment=20Notin?= Date: Tue, 14 Jan 2025 10:58:18 +0100 Subject: [PATCH] Update preventing-script-injection.md --- .../docs-conceptual/security/preventing-script-injection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/reference/docs-conceptual/security/preventing-script-injection.md b/reference/docs-conceptual/security/preventing-script-injection.md index 6ab2a1cc0fe1..47319e86724b 100644 --- a/reference/docs-conceptual/security/preventing-script-injection.md +++ b/reference/docs-conceptual/security/preventing-script-injection.md @@ -158,7 +158,7 @@ statements, one of which is arbitrary code injected by the user. pwnd! ``` -### Use the `EscapeSingleQuotedStringContent()` method +#### Use the `EscapeSingleQuotedStringContent()` method To protect against the user inserting their own single quote characters to exploit the function you must use the `EscapeSingleQuotedStringContent()` API. This is a static public method of the PowerShell