aboutsummaryrefslogtreecommitdiffstats
path: root/server/sonar-docs/src
diff options
context:
space:
mode:
authorMikeBirnstiehl <michael.birnstiehl@sonarsource.com>2019-06-27 13:57:12 +0200
committersonartech <sonartech@sonarsource.com>2019-06-28 08:45:58 +0200
commit41775a1b983fff935264484bdef27e693f896ac1 (patch)
treefd62e29679498973483723857dc184bcce0b7856 /server/sonar-docs/src
parent3367f7fe7e9697343fdfa9a7dc2d1af0c2248805 (diff)
downloadsonarqube-41775a1b983fff935264484bdef27e693f896ac1.tar.gz
sonarqube-41775a1b983fff935264484bdef27e693f896ac1.zip
DOCS update Security HS wording
Diffstat (limited to 'server/sonar-docs/src')
-rw-r--r--server/sonar-docs/src/pages/user-guide/security-hotspots.md4
1 files changed, 2 insertions, 2 deletions
diff --git a/server/sonar-docs/src/pages/user-guide/security-hotspots.md b/server/sonar-docs/src/pages/user-guide/security-hotspots.md
index 263138af573..29bfb487368 100644
--- a/server/sonar-docs/src/pages/user-guide/security-hotspots.md
+++ b/server/sonar-docs/src/pages/user-guide/security-hotspots.md
@@ -5,14 +5,14 @@ url: /user-guide/security-hotspots/
## What is a Security Hotspot?
-Unlike Vulnerabilities, Security Hotspots aren't necessarily issues that are open to attack. Instead, Security Hotspots highlight security-sensitive pieces of code that need to be manually reviewed. Upon review, you might be find a Vulnerability at a Security Hotspot location that needs to be fixed or that there is no threat.
+Unlike Vulnerabilities, Security Hotspots aren't necessarily issues that are open to attack. Instead, Security Hotspots highlight security-sensitive pieces of code that need to be manually reviewed. Upon review, you'll either find a Vulnerability that needs to be fixed or that there is no threat.
## Why are Security Hotspots Important?
Security Hotspots help focus the efforts of developers who are manually checking security-sensitive code. Reviewing Security Hotspots allows you to:
* **Fix security issues** – Reviewing Security Hotspots gives you the opportunity to detect vulnerabilities and ensure issues are fixed before merging pull requests or releasing your branch.
-* **Learn about security** – {instance} explains why your code was identified as a Security Hotspot and the link between your Security Hotspots and well-known attacks or weaknesses such as SQL Injection, Weak Cryptography, or Authentication. Knowing this makes you aware of when you're working on security-sensitive code and helps you avoid creating Vulnerabilities.
+* **Learn about security** – {instance} explains why your code was identified as a Security Hotspot and the link between your Security Hotspots and well-known attacks or weaknesses such as SQL Injection, Weak Cryptography, or Authentication. This helps you to know when you're working on security-sensitive code and to avoid creating Vulnerabilities.
## Security Hotspot Lifecycle
Security Hotspots have a dedicated lifecycle and must be reviewed by someone with the "Administer Security Hotspots" permission.