This is an automated email from the ASF dual-hosted git repository.

pkarwasz pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/logging-site.git

commit fef16333e09cb4c70ef7154d720c918bfff100bb
Author: Piotr P. Karwasz <pkarwasz-git...@apache.org>
AuthorDate: Wed Aug 13 15:09:42 2025 +0200

    fix: mangling -> tampering
---
 _threat-model-common.adoc | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/_threat-model-common.adoc b/_threat-model-common.adoc
index e1585b49..64baf472 100644
--- a/_threat-model-common.adoc
+++ b/_threat-model-common.adoc
@@ -60,7 +60,7 @@ Although the context map is only accessible by developers, it 
has been known to
 See 
https://owasp.org/www-community/vulnerabilities/Deserialization_of_untrusted_data[the
 related OWASP guide] for details.
 
 * If parameterized logging is used, the format string is **trusted**:
-** Programmers **should** use compile time constants as format strings to 
prevent attackers from mangling messages.
+** Programmers **should** use compile-time constants as format strings to 
prevent attackers from tampering messages.
 See 
https://logging.apache.org/log4j/2.x/manual/api.html#best-practice-concat[Don't 
use string concatenation] for an example.
 
 Untrusted Sources::

Reply via email to