Skip to content

Commit ce2f251

Browse files
authored
Fix a couple blog typos (#248)
1 parent 0835d60 commit ce2f251

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

security-update-on-incoming-webhooks.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Webhooks from integrations (like GitHub) are used to:
1313
- Create and delete previews from pull requests (if you have this feature enabled).
1414
- Update the identifier of the latest version (if you have your default branch set to empty in your project's settings).
1515

16-
Last week, our team was make aware that manually created webhooks from integrations lacked support for a shared secret,
16+
Last week, our team was made aware that manually created webhooks from integrations lacked support for a shared secret,
1717
which is used to verify the authenticity of the webhook,
1818
ensuring they originate from the expected source and not from a malicious user.
1919

@@ -23,7 +23,7 @@ so we can verify the authenticity of the webhook.
2323
Security implications
2424
---------------------
2525

26-
The lacking of a shared secret for manually created integrations together with a legacy feature that automatically created integrations in certain circumstances,
26+
The lack of a shared secret for manually created integrations together with a legacy feature that automatically created integrations in certain circumstances,
2727
could have allowed unauthorized users to create integrations without a shared secret.
2828
Allowing the attacker to trigger builds,
2929
create and delete previews from pull requests (if you had this feature enabled),

0 commit comments

Comments
 (0)