From 34f6dbec98d09b22dad02b3e5374e2efc3c2cac5 Mon Sep 17 00:00:00 2001 From: Andrey Sobolev Date: Wed, 5 Jun 2024 10:28:54 +0300 Subject: [PATCH 1/2] Fix a few typos in README --- README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 02529a96..b1e4c938 100644 --- a/README.md +++ b/README.md @@ -14,8 +14,8 @@ build tool. The syntax is Rake-like, so it should be familiar to most Rake users. Please note: Thor, by design, is a system tool created to allow seamless file and url -access, which should not receive application user input. It relies on [open-uri][open-uri], -which combined with application user input would provide a command injection attack +access, which, should not receive application user input. It relies on [open-uri][open-uri], +which combined with application user input, would provide a command injection attack vector. [rake]: https://github.com/ruby/rake @@ -27,7 +27,7 @@ Installation Usage and documentation ----------------------- -Please see the [wiki][] for basic usage and other documentation on using Thor. You can also checkout the [official homepage][homepage]. +Please see the [wiki][] for basic usage and other documentation on using Thor. You can also check out the [official homepage][homepage]. [wiki]: https://github.com/rails/thor/wiki [homepage]: http://whatisthor.com/ From 42fb1db68a4b4e8aa0e5a5bbceeb675a5c5decb4 Mon Sep 17 00:00:00 2001 From: Andrey Sobolev Date: Wed, 5 Jun 2024 10:35:59 +0300 Subject: [PATCH 2/2] Add a missed comma to readme --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index b1e4c938..fed04b7a 100644 --- a/README.md +++ b/README.md @@ -14,8 +14,8 @@ build tool. The syntax is Rake-like, so it should be familiar to most Rake users. Please note: Thor, by design, is a system tool created to allow seamless file and url -access, which, should not receive application user input. It relies on [open-uri][open-uri], -which combined with application user input, would provide a command injection attack +access, which should not receive application user input. It relies on [open-uri][open-uri], +which, combined with application user input, would provide a command injection attack vector. [rake]: https://github.com/ruby/rake