aboutsummaryrefslogtreecommitdiffstats
path: root/server/sonar-docs
diff options
context:
space:
mode:
authorChristine Curry <89850583+christine-curry-sonarsource@users.noreply.github.com>2022-06-14 14:29:39 +0100
committersonartech <sonartech@sonarsource.com>2022-06-14 20:02:51 +0000
commit55e999d240d2b93c71f3802f72a3d35bae7f1794 (patch)
tree534549fb3575ddafa6e9b0dccc2070190924ccb8 /server/sonar-docs
parent921cf12efecec4e87848ee2dcfff948f0e7f3980 (diff)
downloadsonarqube-55e999d240d2b93c71f3802f72a3d35bae7f1794.tar.gz
sonarqube-55e999d240d2b93c71f3802f72a3d35bae7f1794.zip
SONAR-16487 Update Webhooks and Rules docs - fix terminology (#6103)
Terminology Fix
Diffstat (limited to 'server/sonar-docs')
-rw-r--r--server/sonar-docs/src/pages/project-administration/webhooks.md2
-rw-r--r--server/sonar-docs/src/pages/user-guide/rules.md4
2 files changed, 3 insertions, 3 deletions
diff --git a/server/sonar-docs/src/pages/project-administration/webhooks.md b/server/sonar-docs/src/pages/project-administration/webhooks.md
index 4556590d9ed..339210aff5c 100644
--- a/server/sonar-docs/src/pages/project-administration/webhooks.md
+++ b/server/sonar-docs/src/pages/project-administration/webhooks.md
@@ -100,7 +100,7 @@ The Payload is a JSON document which includes:
## Securing your webhooks
-After you've configured your server to receive payloads, you want to be sure that the payloads you receive are initiated by {instance} and not by hackers. You can do this by validating a hash signature that ensures that requests originate from {instance}.
+After you've configured your server to receive payloads, you want to be sure that the payloads you receive are initiated by {instance} and not by attackers. You can do this by validating a hash signature that ensures that requests originate from {instance}.
### Setting your secret
diff --git a/server/sonar-docs/src/pages/user-guide/rules.md b/server/sonar-docs/src/pages/user-guide/rules.md
index 2167c0b556c..dd0acdd7669 100644
--- a/server/sonar-docs/src/pages/user-guide/rules.md
+++ b/server/sonar-docs/src/pages/user-guide/rules.md
@@ -90,7 +90,7 @@ The {instance} Quality Model divides rules into four categories: Bugs, Vulnerabi
If the answer is "yes", then it's a Bug rule.
If not...
-**Is the rule about code that could be exploited by a hacker?**
+**Is the rule about code that could be exploited by an attacker?**
If so, then it's a Vulnerability rule.
If not...
@@ -128,7 +128,7 @@ Likelihood: **What's the probability that the Worst Thing will happen?**
### Vulnerabilities
Impact: **Could the exploitation of the Worst Thing result in significant damage to your assets or your users?**
-Likelihood: **What is the probability that a hacker will be able to exploit the Worst Thing?**
+Likelihood: **What is the probability that an attacker will be able to exploit the Worst Thing?**
### Security Hotspots
Security Hotspots are not assigned severities as it is unknown whether there is truly an underlying vulnerability until they are reviewed.