summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--cli/args/mod.rs2
-rw-r--r--tests/specs/permission/deny_run_binary_absolute_path/main.out2
-rw-r--r--tests/specs/run/allow_run_insecure_warnings/no_allow_list.out2
-rw-r--r--tests/testdata/run/deny_some_permission_args.out2
4 files changed, 4 insertions, 4 deletions
diff --git a/cli/args/mod.rs b/cli/args/mod.rs
index db8cf149e..0851dfd6c 100644
--- a/cli/args/mod.rs
+++ b/cli/args/mod.rs
@@ -1705,7 +1705,7 @@ fn warn_insecure_allow_run_flags(flags: &Flags) {
// discourage using --allow-run without an allow list
if allow_run_list.is_empty() {
log::warn!(
- "{} --allow-run can be trivially exploited. Prefer specifying an allow list (https://docs.deno.com/runtime/fundamentals/security/#running-subprocesses)",
+ "{} --allow-run without an allow list is susceptible to exploits. Prefer specifying an allow list (https://docs.deno.com/runtime/fundamentals/security/#running-subprocesses)",
colors::yellow("Warning")
);
}
diff --git a/tests/specs/permission/deny_run_binary_absolute_path/main.out b/tests/specs/permission/deny_run_binary_absolute_path/main.out
index 7f11e7880..fef29eae7 100644
--- a/tests/specs/permission/deny_run_binary_absolute_path/main.out
+++ b/tests/specs/permission/deny_run_binary_absolute_path/main.out
@@ -1,4 +1,4 @@
-Warning --allow-run can be trivially exploited. Prefer specifying an allow list (https://docs.deno.com/runtime/fundamentals/security/#running-subprocesses)
+Warning --allow-run without an allow list is susceptible to exploits. Prefer specifying an allow list (https://docs.deno.com/runtime/fundamentals/security/#running-subprocesses)
NotCapable: Requires run access to "deno", run again with the --allow-run flag
at [WILDCARD] {
name: "NotCapable"
diff --git a/tests/specs/run/allow_run_insecure_warnings/no_allow_list.out b/tests/specs/run/allow_run_insecure_warnings/no_allow_list.out
index 277d0036c..293b4446a 100644
--- a/tests/specs/run/allow_run_insecure_warnings/no_allow_list.out
+++ b/tests/specs/run/allow_run_insecure_warnings/no_allow_list.out
@@ -1 +1 @@
-Warning --allow-run can be trivially exploited. Prefer specifying an allow list (https://docs.deno.com/runtime/fundamentals/security/#running-subprocesses)
+Warning --allow-run without an allow list is susceptible to exploits. Prefer specifying an allow list (https://docs.deno.com/runtime/fundamentals/security/#running-subprocesses)
diff --git a/tests/testdata/run/deny_some_permission_args.out b/tests/testdata/run/deny_some_permission_args.out
index fe3e57d69..be2e832fe 100644
--- a/tests/testdata/run/deny_some_permission_args.out
+++ b/tests/testdata/run/deny_some_permission_args.out
@@ -1,4 +1,4 @@
-Warning --allow-run can be trivially exploited. Prefer specifying an allow list (https://docs.deno.com/runtime/fundamentals/security/#running-subprocesses)
+Warning --allow-run without an allow list is susceptible to exploits. Prefer specifying an allow list (https://docs.deno.com/runtime/fundamentals/security/#running-subprocesses)
PermissionStatus { state: "granted", onchange: null, partial: true }
PermissionStatus { state: "denied", onchange: null }
PermissionStatus { state: "granted", onchange: null }