From 6d02494e61746520ecaa4073cb2af2858909d28f Mon Sep 17 00:00:00 2001 From: Ian Wright <55286208+Z80coder@users.noreply.github.com> Date: Tue, 5 May 2020 11:23:32 +0100 Subject: [PATCH] correct "known endpoints" to "candidate endpoints" --- .../docs/about-adaptive-threat-modeling.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/javascript/ql/src/experimental/adaptivethreatmodeling/docs/about-adaptive-threat-modeling.md b/javascript/ql/src/experimental/adaptivethreatmodeling/docs/about-adaptive-threat-modeling.md index bd7c5be80ff..7673e3dcc45 100644 --- a/javascript/ql/src/experimental/adaptivethreatmodeling/docs/about-adaptive-threat-modeling.md +++ b/javascript/ql/src/experimental/adaptivethreatmodeling/docs/about-adaptive-threat-modeling.md @@ -52,7 +52,7 @@ For full coverage, run the boosted query and the standard query together. You can help ATM find more security vulnerabilities in two ways: -- You can improve the recall and precision of the known endpoints by adding more true positives to and removing any false positives from the set of known endpoints. +- You can improve the recall and precision of the candidate endpoints by adding more true positives to and removing any false positives from the set of known endpoints. This will improve the scoring, increasing the likelihood that higher scoring results are true positives. - You can refine the endpoint filter such that it allows more true candidate endpoints to pass through and excludes more false candidate endpoints. This has the effect of increasing the number of true positives and reducing the number of false positives.