Skip to content
This repository was archived by the owner on Sep 25, 2019. It is now read-only.

Commit 57d5b55

Browse files
Glyn Lscissorsneedfoodtoo
authored andcommitted
fix(challenges): adding code tags to description
frames and other code in description were not surrounded by <code> tags and rendering poorly on page. ISSUES CLOSED: #17911-freecodecamp
1 parent c2e5794 commit 57d5b55

File tree

1 file changed

+2
-2
lines changed
  • challenges/06-information-security-and-quality-assurance

1 file changed

+2
-2
lines changed

challenges/06-information-security-and-quality-assurance/helmetjs.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,8 @@
5151
"title": "Mitigate the Risk of Clickjacking with helmet.frameguard()",
5252
"description": [
5353
"As a reminder, this project is being built upon the following starter project on <a href='https://glitch.com/#!/import/github/freeCodeCamp/boilerplate-infosec/'>Glitch</a>, or cloned from <a href='https://github.com/freeCodeCamp/boilerplate-infosec/'>GitHub</a>.",
54-
"Your page could be put in a &lt;frame&gt; or &lt;iframe&gt; without your consent. This can result in clickjacking attacks, among other things. Clickjacking is a technique of tricking a user into interacting with a page different from what the user thinks it is. This can be obtained executing your page in a malicious context, by mean of iframing. In that context a hacker can put a hidden layer over your page. Hidden buttons can be used to run bad scripts. This middleware sets the X-Frame-Options header. It restricts who can put your site in a frame. It has three modes: DENY, SAMEORIGIN, and ALLOW-FROM.",
55-
"We don’t need our app to be framed. You should use helmet.frameguard() passing with the configuration object {action: 'deny'}."
54+
"Your page could be put in a <code>&lt;frame&gt;</code> or <code>&lt;iframe&gt;</code> without your consent. This can result in clickjacking attacks, among other things. Clickjacking is a technique of tricking a user into interacting with a page different from what the user thinks it is. This can be obtained executing your page in a malicious context, by mean of iframing. In that context a hacker can put a hidden layer over your page. Hidden buttons can be used to run bad scripts. This middleware sets the X-Frame-Options header. It restricts who can put your site in a frame. It has three modes: DENY, SAMEORIGIN, and ALLOW-FROM.",
55+
"We don’t need our app to be framed. You should use <code>helmet.frameguard()</code> passing with the configuration object <code>{action: 'deny'}</code>."
5656
],
5757
"tests": [
5858
{

0 commit comments

Comments
 (0)