From 65cfc811f7774e47d8e0e2b5379b939cd964d67e Mon Sep 17 00:00:00 2001 From: Michael <184316+muescha@users.noreply.github.com> Date: Tue, 14 Apr 2020 13:47:24 +0200 Subject: [PATCH] fix brand names (#23075) --- docs/docs/security-in-gatsby.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/docs/security-in-gatsby.md b/docs/docs/security-in-gatsby.md index 5f46a25fb65f6..9959eb19fe742 100644 --- a/docs/docs/security-in-gatsby.md +++ b/docs/docs/security-in-gatsby.md @@ -156,10 +156,10 @@ currently there is a [compatibility issue](https://github.com/gatsbyjs/gatsby/is ## Other Resources - [Security for Modern Web Frameworks](https://www.gatsbyjs.org/blog/2019-04-06-security-for-modern-web-frameworks/) -- [Docs ReactJS: DOM Elements](https://reactjs.org/docs/dom-elements.html#dangerouslysetinnerhtml) +- [Docs React: DOM Elements](https://reactjs.org/docs/dom-elements.html#dangerouslysetinnerhtml) - [OWASP XSS filter evasion cheatsheet](https://owasp.org/www-community/xss-filter-evasion-cheatsheet) - [OWASP CSRF prevention cheat sheet](https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#samesite-cookie-attribute) -- [Warn for javascript: URLs in DOM sinks #15047](https://github.com/facebook/react/pull/15047) +- [Warn for JavaScript: URLs in DOM sinks #15047](https://github.com/facebook/react/pull/15047) - [How to prevent XSS attacks when using dangerouslySetInnerHTML in React](https://medium.com/@Jam3/how-to-prevent-xss-attacks-when-using-dangerouslysetinnerhtml-in-react-f669f778cebb) - [Exploiting XSS via Markdown](https://medium.com/taptuit/exploiting-xss-via-markdown-72a61e774bf8) - [Auditing package dependencies for security vulnerabilities](https://docs.npmjs.com/auditing-package-dependencies-for-security-vulnerabilities)