Skip to content

Commit 4332e00

Browse files
authored
Update README.rst
1 parent 5722571 commit 4332e00

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

README.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,13 +63,13 @@ Soon you will find a `README.rst`_ in every directory in the ``pyt/`` folder, `s
6363
How to Use
6464
============
6565

66-
1. Choose a web framework: `The -a option chooses what functions will have their arguments tainted`_, by default it is Flask.
66+
1. Choose a web framework: `The -a option determines which functions will have their arguments tainted`_, by default it is Flask.
6767

6868
2. (optional) Customize source and sink information: Use the ``-t`` option to specify sources and sinks, by default `this file is used`_.
6969

7070
3. (optional) Customize which library functions propagate taint: For functions that are imported from libraries, e.g. ``url_for`` or ``os.path.join``, use the ``-m`` option to specify whether or not they return tainted values given tainted inputs, by `default this file is used`_.
7171

72-
.. _The -a option chooses what functions will have their arguments tainted: https://github.com/python-security/pyt/tree/master/pyt/web_frameworks#web-frameworks
72+
.. _The -a option determines which functions will have their arguments tainted: https://github.com/python-security/pyt/tree/master/pyt/web_frameworks#web-frameworks
7373
.. _this file is used: https://github.com/python-security/pyt/blob/master/pyt/vulnerability_definitions/all_trigger_words.pyt
7474
.. _default this file is used: https://github.com/python-security/pyt/blob/master/pyt/vulnerability_definitions/blackbox_mapping.json
7575

0 commit comments

Comments
 (0)