This repository was archived by the owner on Jun 8, 2025. It is now read-only.
File tree Expand file tree Collapse file tree 3 files changed +7
-7
lines changed Expand file tree Collapse file tree 3 files changed +7
-7
lines changed Original file line number Diff line number Diff line change 59
59
draft-en.markdown
60
60
61
61
- name : Save pdfs and epubs
62
- uses : actions/upload-artifact@master
62
+ uses : actions/upload-artifact@v3.1.2
63
63
with :
64
64
name : en-draft
65
65
path : publish
97
97
stable-en.markdown
98
98
99
99
- name : Save pdfs and epubs
100
- uses : actions/upload-artifact@master
100
+ uses : actions/upload-artifact@v3.1.2
101
101
with :
102
102
name : en-stable
103
103
path : publish
@@ -135,7 +135,7 @@ jobs:
135
135
stable-es.markdown
136
136
137
137
- name : Save pdfs and epubs
138
- uses : actions/upload-artifact@master
138
+ uses : actions/upload-artifact@v3.1.2
139
139
with :
140
140
name : es-stable
141
141
path : publish
Original file line number Diff line number Diff line change @@ -273,7 +273,7 @@ tags: SCP-QRG
273
273
- [ ] All cryptographic functions used to protect secrets from the
274
274
application user must be implemented on a trusted system
275
275
276
- - [ ] Protect master secrets from unauthorized access
276
+ - [ ] Protect secrets from unauthorized access
277
277
278
278
- [ ] Cryptographic modules should fail securely
279
279
@@ -313,7 +313,7 @@ tags: SCP-QRG
313
313
314
314
- [ ] Restrict access to logs to only authorized individuals
315
315
316
- - [ ] Utilize a master routine for all logging operations
316
+ - [ ] Utilize a central routine for all logging operations
317
317
318
318
- [ ] Do not store sensitive information in logs, including unnecessary
319
319
system details, session identifiers or passwords
Original file line number Diff line number Diff line change @@ -274,7 +274,7 @@ document: OWASP Secure Coding Practices - Quick Reference Guide
274
274
- [ ] All cryptographic functions used to protect secrets from the
275
275
application user must be implemented on a trusted system
276
276
277
- - [ ] Protect master secrets from unauthorized access
277
+ - [ ] Protect secrets from unauthorized access
278
278
279
279
- [ ] Cryptographic modules should fail securely
280
280
@@ -314,7 +314,7 @@ document: OWASP Secure Coding Practices - Quick Reference Guide
314
314
315
315
- [ ] Restrict access to logs to only authorized individuals
316
316
317
- - [ ] Utilize a master routine for all logging operations
317
+ - [ ] Utilize a central routine for all logging operations
318
318
319
319
- [ ] Do not store sensitive information in logs, including unnecessary
320
320
system details, session identifiers or passwords
You can’t perform that action at this time.
0 commit comments