From ed708c1903edb96fa04e85646041350a82251ac6 Mon Sep 17 00:00:00 2001 From: Alex Ford Date: Wed, 8 Sep 2021 12:12:53 +0100 Subject: [PATCH] Update ql/src/queries/security/cwe-079/ReflectedXSS.qhelp Co-authored-by: Nick Rolfe --- ql/src/queries/security/cwe-079/ReflectedXSS.qhelp | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/ql/src/queries/security/cwe-079/ReflectedXSS.qhelp b/ql/src/queries/security/cwe-079/ReflectedXSS.qhelp index 6529bf7bb81..760ae2d376a 100644 --- a/ql/src/queries/security/cwe-079/ReflectedXSS.qhelp +++ b/ql/src/queries/security/cwe-079/ReflectedXSS.qhelp @@ -13,9 +13,9 @@

- To guard against cross-site scripting, consider escaping the input before - writing user input to the page. In some frameworks, such as Rails, escaping will - be performed implicitly and by default. + To guard against cross-site scripting, escape user input before writing it + to the page. Some frameworks, such as Rails, perform this escaping + implicitly and by default.