From f36f782aba6fcb02673e438a1065db6262f48368 Mon Sep 17 00:00:00 2001 From: Edouard Coussoux Date: Wed, 8 Oct 2025 13:42:19 +0200 Subject: [PATCH] docs: Fix typo in vulnerabilities.rst --- doc/source/how-to/vulnerabilities.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/source/how-to/vulnerabilities.rst b/doc/source/how-to/vulnerabilities.rst index b8453cf9..146e835c 100644 --- a/doc/source/how-to/vulnerabilities.rst +++ b/doc/source/how-to/vulnerabilities.rst @@ -622,7 +622,7 @@ Fixing it is important because malicious inputs could execute unintended command run: | echo ${{ github.workspace }} # Template expansions are resolved before workflows and jobs run. These expansions echo ${{ runner.temp }} # insert their results directly into the context, which can accidentally introduce shell injection risks. - echo ${{ input.user-input }} # This is especially through when such expansion is from a user input. + echo ${{ input.user-input }} # This is especially true when such expansion is from a user input. .. tab-item:: Remediation