Skip to content

Commit

Permalink
Fix MD lint issues (#2)
Browse files Browse the repository at this point in the history
* fix lint

Signed-off-by: Avishay <avishay.balter@gmail.com>

* charter updated

Signed-off-by: Avishay <avishay.balter@gmail.com>

---------

Signed-off-by: Avishay <avishay.balter@gmail.com>
  • Loading branch information
balteravishay committed May 1, 2023
1 parent e71232f commit 1233fa3
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion CHARTER.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

## Memory Safety SIG

Adopted [DATE]
Adopted 03.28.2023

This Technical Charter sets forth the responsibilities and procedures for technical contribution to, and oversight of, the Memory Safety SIG open source community, which has been established as a Special Interest Group (SIG) (the "Technical Initiative") under the Open Source Security Foundation (the “OpenSSF”). All contributors (including committers, maintainers, and other technical positions) and other participants in the Technical Initiative (collectively, “Collaborators”) must comply with the terms of this Technical Charter and the OpenSSF Charter.

Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ The Memory Safety SIG is a group working within the [OpenSSF's Best Practices Wo

## **Motivation**

Memory safety vulnerabilities, caused by mistakes in memory management, are common in unsafe programming languages like C and C++.This type of vulnerability is responsible for a majority of security breaches, with estimates from Microsoft and Google showing that up to 70% and 90% of vulnerabilities in their products, respectively, are memory safety vulnerabilities.
Memory safety vulnerabilities, caused by mistakes in memory management, are common in unsafe programming languages like C and C++.This type of vulnerability is responsible for a majority of security breaches, with estimates from Microsoft and Google showing that up to 70% and 90% of vulnerabilities in their products, respectively, are memory safety vulnerabilities.

Memory safe languages like Rust, Go, and Java are less prone to these types of errors. The consequences of these vulnerabilities are not just technical, but can result in significant financial losses and invasion of personal data and privacy. A recent analysis by Google Project Zero showed that 67% of vulnerabilities exploited in the wild were due to a lack of memory safety, making it a critical issue that needs to be addressed in software development.

Expand Down

0 comments on commit 1233fa3

Please sign in to comment.