From c23efc31e2721ed192b19d082553cb99a391d24e Mon Sep 17 00:00:00 2001 From: Adin Scannell Date: Fri, 5 Apr 2019 23:21:26 -0700 Subject: Update markdown formatting in security.md --- content/docs/architecture_guide/security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'content/docs') diff --git a/content/docs/architecture_guide/security.md b/content/docs/architecture_guide/security.md index 5f02962ad..fc2a7bf7a 100644 --- a/content/docs/architecture_guide/security.md +++ b/content/docs/architecture_guide/security.md @@ -192,7 +192,7 @@ Additionally, we have practical restrictions that are imposed on the project to minimize the risk of Sentry exploitability. For example: 1. Unsafe code is carefully controlled. All unsafe code is isolated in files - that end with “_unsafe.go”, in order to facilitate validation and auditing. + that end with "unsafe.go", in order to facilitate validation and auditing. No file without the unsafe suffix may import the unsafe package. 1. No CGo is allowed. The Sentry must be a pure Go binary. 1. External imports are not generally allowed within the core packages. Only -- cgit v1.2.3