From f54d226248111428344a31898b73f0f84ebbe5c3 Mon Sep 17 00:00:00 2001 From: Granville Schmidt <1246157+gramidt@users.noreply.github.com> Date: Sun, 14 Feb 2021 07:54:16 -0700 Subject: [PATCH] Fixed typo (#2490) --- docs/security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/security.md b/docs/security.md index 944291bd4b5..f2014b84453 100644 --- a/docs/security.md +++ b/docs/security.md @@ -193,6 +193,6 @@ permissions in order to perform service discovery. For example, the Extensions may also be used to run subprocesses. This can be useful when collection mechanisms that cannot natively be run by the Collector (e.g. -FluentBit). Subprocesses expose a completely separate attack vendor that would +FluentBit). Subprocesses expose a completely separate attack vector that would depend on the subprocess itself. In general, care should be taken before running any subprocesses alongside the Collector.