[clang] c053345 - [clang] Fix typos in documentation
Kazu Hirata via cfe-commits
cfe-commits at lists.llvm.org
Fri Aug 11 21:44:43 PDT 2023
Author: Kazu Hirata
Date: 2023-08-11T21:44:33-07:00
New Revision: c053345b059bd3fa7f0e5f51498c71095b7a1d88
URL: https://github.com/llvm/llvm-project/commit/c053345b059bd3fa7f0e5f51498c71095b7a1d88
DIFF: https://github.com/llvm/llvm-project/commit/c053345b059bd3fa7f0e5f51498c71095b7a1d88.diff
LOG: [clang] Fix typos in documentation
Added:
Modified:
clang/docs/analyzer/checkers.rst
Removed:
################################################################################
diff --git a/clang/docs/analyzer/checkers.rst b/clang/docs/analyzer/checkers.rst
index d3a4ebcaf02025..b7860af80c200d 100644
--- a/clang/docs/analyzer/checkers.rst
+++ b/clang/docs/analyzer/checkers.rst
@@ -2375,8 +2375,8 @@ The malicious data is injected at the taint source (e.g. ``getenv()`` call)
which is then propagated through function calls and being used as arguments of
sensitive operations, also called as taint sinks (e.g. ``system()`` call).
-One can defend agains this type of vulnerability by always checking and
-santizing the potentially malicious, untrusted user input.
+One can defend against this type of vulnerability by always checking and
+sanitizing the potentially malicious, untrusted user input.
The goal of the checker is to discover and show to the user these potential
taint source-sink pairs and the propagation call chain.
@@ -2438,7 +2438,7 @@ Unfortunately, the checker cannot discover automatically that the programmer
have performed data sanitation, so it still emits the warning.
One can get rid of this superflous warning by telling by specifying the
-sanitation functions in the taint configuation file (see
+sanitation functions in the taint configuration file (see
:doc:`user-docs/TaintAnalysisConfiguration`).
.. code-block:: YAML
More information about the cfe-commits
mailing list