Skip to content

Commit

Permalink
fix: spelling
Browse files Browse the repository at this point in the history
  • Loading branch information
jolexxa committed Jan 23, 2025
1 parent be62e59 commit b50fc45
Show file tree
Hide file tree
Showing 2 changed files with 14 additions and 4 deletions.
16 changes: 13 additions & 3 deletions cspell.json
Original file line number Diff line number Diff line change
@@ -1,10 +1,20 @@
{
"$schema": "https://raw.githubusercontent.com/streetsidesoftware/cspell/main/cspell.schema.json",
"version": "0.2",
"ignorePaths": ["node_modules/**", ".**/"],
"files": ["**/*.md", "**/*.mdx", "**/*.tsx", "**/*.ts", "**/*.json"],
"ignorePaths": [
"node_modules/**",
".**/"
],
"files": [
"**/*.md",
"**/*.mdx",
"**/*.tsx",
"**/*.ts",
"**/*.json"
],
"words": [
"ABAP",
"Approov",
"Abuild",
"Agda",
"AMPL",
Expand Down Expand Up @@ -123,4 +133,4 @@
"Zephir",
"Zimpl"
]
}
}
2 changes: 1 addition & 1 deletion src/content/docs/security/security_in_mobile_apps.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -200,7 +200,7 @@ Attackers target app binaries to extract valuable secrets like API keys or crypt
- Integrity checks at app launch can detect unauthorized modifications and redistribution. Violations can be reported to remove fake apps from stores, and specialized services are available to support detection and removal efforts.
:::

Tools and services such as FreeRASP and Aproov can help mitigate the likelihood of a compromised app binary or repackaging attack.
Tools and services such as FreeRASP and Approov can help mitigate the likelihood of a compromised app binary or repackaging attack.

- [Approov](https://approov.io/docs/latest/approov-usage-documentation/)
- [FreeRASP](https://pub.dev/packages/freerasp)
Expand Down

0 comments on commit b50fc45

Please sign in to comment.