diff --git a/docs/reference/rules.njk b/docs/reference/rules.njk index cded23cc6..eb4efac54 100644 --- a/docs/reference/rules.njk +++ b/docs/reference/rules.njk @@ -9,7 +9,7 @@ Rules are ways to detect security risks and vulnerabilities across your codebase The built-in rules aim to keep you protected from the most critical security risks and vulnerabilities of web applications and include corresponding [Common Weakness Enumeration](https://cwe.mitre.org/data/index.html) (CWE) and [OWASP](https://owasp.org/Top10) links to help you identify them. -Don't find a rule you are looking for? You can develop a [custom rule](https://docs.bearer.com/guides/custom-rule/) that allow you to add specific requirements to suit your organization's needs. +Don't find a rule you are looking for? You can develop a [custom rule](https://docs.bearer.com/guides/custom-rule/) that allow you to add specific requirements to suit your organization's needs. {% endrenderTemplate %} @@ -37,6 +37,18 @@ Don't find a rule you are looking for? You can develop a [custom rule](https://d +