Commit 5d385709 authored by JoeWrightss's avatar JoeWrightss Committed by Brian Brazil

Fix spelling error in blog (#1245)

Signed-off-by: 's avatarJoeWrightss <zhoulin.xie@daocloud.io>
parent 5e4af0d4
...@@ -125,7 +125,7 @@ headers](https://fetch.spec.whatwg.org/#http-cors-protocol) such as ...@@ -125,7 +125,7 @@ headers](https://fetch.spec.whatwg.org/#http-cors-protocol) such as
[XSS](https://en.wikipedia.org/wiki/Cross-site_scripting). [XSS](https://en.wikipedia.org/wiki/Cross-site_scripting).
If you are composing PromQL queries that include input from untrusted users If you are composing PromQL queries that include input from untrusted users
(e.g. URL paramaters to console templates, or something you built yourself) who (e.g. URL parameters to console templates, or something you built yourself) who
are not meant to be able to run aribtrary PromQL queries make sure any are not meant to be able to run aribtrary PromQL queries make sure any
untrusted input is appropriately escaped to prevent injection attacks. For untrusted input is appropriately escaped to prevent injection attacks. For
example `up{job="<user_input>"}` would become `up{job=""} or example `up{job="<user_input>"}` would become `up{job=""} or
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment