This ensures consistent spelling of set-{user,group}-ID, and also mentions LD_DEBUG is ignored by ld.so for such binaries.
Index: ld.so.1 =================================================================== RCS file: /OpenBSD/src/libexec/ld.so/ld.so.1,v retrieving revision 1.23 diff -u -p -r1.23 ld.so.1 --- ld.so.1 14 Feb 2019 07:26:31 -0000 1.23 +++ ld.so.1 8 May 2020 09:11:30 -0000 @@ -161,6 +161,7 @@ are recognised and have their usual mean When set, be verbose about what .Nm does. +This variable is ignored for set-user-ID and set-group-ID executables. .El .Sh FILES .Bl -tag -width /var/run/ld.so.hintsXXX -compact Index: ldconfig/ldconfig.8 =================================================================== RCS file: /OpenBSD/src/libexec/ld.so/ldconfig/ldconfig.8,v retrieving revision 1.29 diff -u -p -r1.29 ldconfig.8 --- ldconfig/ldconfig.8 4 Jul 2016 20:56:50 -0000 1.29 +++ ldconfig/ldconfig.8 8 May 2020 09:11:30 -0000 @@ -120,9 +120,7 @@ Switch on verbose mode. .El .Sh SECURITY Special care must be taken when loading shared libraries into the address -space of -.Ev set-user-Id -programs. +space of set-user-ID and set-group-ID programs. Whenever such a program is run, .Xr ld.so 1 will only load shared libraries from the @@ -141,7 +139,7 @@ It is presumed that the set of directori .Nm are under control of the system's administrator. .Xr ld.so 1 -further assists set-user-Id programs by erasing the +further assists set-user-ID and set-group-ID programs by erasing the .Ev LD_LIBRARY_PATH from the environment. .Sh ENVIRONMENT