aboutsummaryrefslogtreecommitdiffstats
path: root/guides/source
diff options
context:
space:
mode:
authorRafael Mendonça França <rafaelmfranca@gmail.com>2014-08-15 10:43:55 -0300
committerRafael Mendonça França <rafaelmfranca@gmail.com>2014-08-15 10:45:53 -0300
commita59b9e2284353dcf8cf6d77b97aaa4255563c807 (patch)
tree8d7eabb2aa275ca75c06bdd40dfa5d07364ce040 /guides/source
parent967a2ff9989bbf36d283ee447cfcc41750e8b025 (diff)
downloadrails-a59b9e2284353dcf8cf6d77b97aaa4255563c807.tar.gz
rails-a59b9e2284353dcf8cf6d77b97aaa4255563c807.tar.bz2
rails-a59b9e2284353dcf8cf6d77b97aaa4255563c807.zip
Point to rubygems instead of Rails GitHub. [ci skip]
The rails repository is not the official plugin anymore
Diffstat (limited to 'guides/source')
-rw-r--r--guides/source/security.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/guides/source/security.md b/guides/source/security.md
index d27ec5423f..f1db81458c 100644
--- a/guides/source/security.md
+++ b/guides/source/security.md
@@ -847,7 +847,7 @@ It is recommended to _use RedCloth in combination with a whitelist input filter_
NOTE: _The same security precautions have to be taken for Ajax actions as for "normal" ones. There is at least one exception, however: The output has to be escaped in the controller already, if the action doesn't render a view._
-If you use the [in_place_editor plugin](https://github.com/rails/in_place_editing), or actions that return a string, rather than rendering a view, _you have to escape the return value in the action_. Otherwise, if the return value contains a XSS string, the malicious code will be executed upon return to the browser. Escape any input value using the h() method.
+If you use the [in_place_editor plugin](https://rubygems.org/gems/in_place_editing), or actions that return a string, rather than rendering a view, _you have to escape the return value in the action_. Otherwise, if the return value contains a XSS string, the malicious code will be executed upon return to the browser. Escape any input value using the h() method.
### Command Line Injection