Python: Apply suggestions from code review

Co-authored-by: yoff <lerchedahl@gmail.com>
This commit is contained in:
Rasmus Wriedt Larsen
2021-05-18 11:53:11 +02:00
committed by GitHub
parent 0ade23ab2a
commit 9156316b14
2 changed files with 3 additions and 3 deletions

View File

@@ -19,7 +19,7 @@
<li>
collision attacks: if you know a hash value <code>h(x)</code>,
you should not be able to easily find a different input <code>y</code>
such that hash value is the same <code>h(x) = h(y)</code>.
with the same hash value <code>h(x) = h(y)</code>.
</li>
</ul>
<p>
@@ -30,7 +30,7 @@
</p>
<p>
As an example, both MD5 and SHA-1 is known to be vulnerable to collision attacks.
As an example, both MD5 and SHA-1 are known to be vulnerable to collision attacks.
</p>
<p>

View File

@@ -1,6 +1,6 @@
/**
* Provides an extension point for for modeling sensitive data, such as secrets, certificates, or passwords.
* Sensitive data is can be interesting to use as data-flow sources in security queries.
* Sensitive data can be interesting to use as data-flow sources in security queries.
*/
private import python