From 5aa4fd339f8a35b5c164e3e04ef2c13db21ed389 Mon Sep 17 00:00:00 2001 From: Abhinav Nain Date: Thu, 26 Sep 2024 11:34:44 +0530 Subject: [PATCH] MD Linter changes --- .markdownlint.json | 3 +-- README.md | 10 +++++----- .../lack_of_jailbreak_detection/recommendations.md | 1 + .../server_side_injection/ldap_injection/template.md | 1 + 4 files changed, 8 insertions(+), 7 deletions(-) diff --git a/.markdownlint.json b/.markdownlint.json index 47812c78..63421f08 100644 --- a/.markdownlint.json +++ b/.markdownlint.json @@ -6,6 +6,5 @@ "line_length": false, "fenced-code-language": false, "no-emphasis-as-heading": false, - "MD041": false, - "blanks-around-headings": false + "first-line-heading": false } diff --git a/README.md b/README.md index 446faabf..3484c13e 100644 --- a/README.md +++ b/README.md @@ -149,20 +149,20 @@ Incorrect: Incorrect: -> Throughout the course of the engagement, a critical severity SQL injection was discovered in the web application (www.example.com) which could be used by an attacker to exfiltrate personally identifiable information from the backend database. +> Throughout the course of the engagement, a critical severity SQL injection was discovered in the web application () which could be used by an attacker to exfiltrate personally identifiable information from the backend database. Correct: -> An SQL injection was discovered in www.example.com allowing a malicious attacker to exfiltrate personally identifiable information. +> An SQL injection was discovered in allowing a malicious attacker to exfiltrate personally identifiable information. ### Split Up Long Sentences Incorrect: -> An SQL injection was discovered in www.example.com allowing a malicious attacker to exfiltrate personally identifiable information including email addresses which would be considered a GDPR violation and poses a considerable business risk. +> An SQL injection was discovered in allowing a malicious attacker to exfiltrate personally identifiable information including email addresses which would be considered a GDPR violation and poses a considerable business risk. Correct: -> An SQL injection was discovered in www.example.com allowing a malicious attacker to exfiltrate personally identifiable information. The retrievable data includes passwords, email addresses and full names. This poses a GDPR violation and considerable business risk. +> An SQL injection was discovered in allowing a malicious attacker to exfiltrate personally identifiable information. The retrievable data includes passwords, email addresses and full names. This poses a GDPR violation and considerable business risk. ## Acronyms @@ -184,7 +184,7 @@ Incorrect: pen test, PenTest, Pen Test ## A vs. An -"An" should be used when the next word starts with a consonant _sound_. Otherwise, "A" should be used. +"An" should be used when the next word starts with a consonant *sound*. Otherwise, "A" should be used. Correct: diff --git a/submissions/description/lack_of_binary_hardening/lack_of_jailbreak_detection/recommendations.md b/submissions/description/lack_of_binary_hardening/lack_of_jailbreak_detection/recommendations.md index 0c64985c..4ad50dfb 100644 --- a/submissions/description/lack_of_binary_hardening/lack_of_jailbreak_detection/recommendations.md +++ b/submissions/description/lack_of_binary_hardening/lack_of_jailbreak_detection/recommendations.md @@ -1,4 +1,5 @@ # Recommendation(s) + It is recommended to implement exploit mitigation controls within the application that prevent an attacker from analyzing, reverse engineering, or performing unauthorized code modifications. This can include leveraging jailbreak detection frameworks and libraries specifically designed to identify jailbroken (or rooted Android) devices. A good framework will monitor the runtime environment and check for the presence of known jailbreak files and directories. For further information, please refer to: diff --git a/submissions/description/server_side_injection/ldap_injection/template.md b/submissions/description/server_side_injection/ldap_injection/template.md index 124fa7cd..5d9615fd 100644 --- a/submissions/description/server_side_injection/ldap_injection/template.md +++ b/submissions/description/server_side_injection/ldap_injection/template.md @@ -1,5 +1,6 @@ #### Business Impact + LDAP injection vulnerabilities can lead to reputational damage through the impact to customers’ trust, or to regulatory fines due to an attacker’s unauthorized access to data. The severity of the impact to the business is dependent on the sensitivity of the data being stored in, and transmitted by the application. #### Steps to Reproduce