This is an automated email from the ASF dual-hosted git repository.

taragolis pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/airflow.git


The following commit(s) were added to refs/heads/main by this push:
     new 39b13ec343 Fix security model link (#33597)
39b13ec343 is described below

commit 39b13ec343376d78dae543749fd1233263cd6507
Author: Jed Cunningham <[email protected]>
AuthorDate: Mon Aug 21 15:10:59 2023 -0600

    Fix security model link (#33597)
---
 .github/SECURITY.md | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/.github/SECURITY.md b/.github/SECURITY.md
index 1f9ad752bc..4035fa8b6e 100644
--- a/.github/SECURITY.md
+++ b/.github/SECURITY.md
@@ -18,9 +18,9 @@
 -->
 
 This document contains information on how to report security vulnerabilities 
in Apache Airflow and
-how the security issues reported to Apache Airflow security team are handled. 
If you would like
-to learn about the security model of Airflow head to
-[Airflow 
Security](https://airflow.apache.org/docs/apache-airflow/stable/security/)
+how security issues reported to the Apache Airflow security team are handled. 
If you would like
+to learn more, head to the
+[Airflow 
security](https://airflow.apache.org/docs/apache-airflow/stable/security/) 
documentation.
 
 ## Reporting Vulnerabilities
 
@@ -52,7 +52,7 @@ of how it affects Airflow security. We may ask that you 
resubmit your report if
 movie, HTML, or PDF attachment when you could as easily describe it with plain 
text.
 
 Before reporting vulnerabilities, please make sure to read and understand the
-[security 
model](https://airflow.apache.org/docs/apache-airflow/stable/security/) of 
Airflow, because
+[security 
model](https://airflow.apache.org/docs/apache-airflow/stable/security/security_model.html)
 of Airflow, because
 some of the potential security vulnerabilities that are valid for projects 
that are publicly accessible
 from the Internet, are not valid for Airflow. Airflow is not designed to be 
used by untrusted users, and some
 trusted users are trusted enough to do a variety of operations that could be 
considered as vulnerabilities

Reply via email to