Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Commit 897dc70

Browse filesBrowse files
committed
Added a lot of changes suggested by reviewers
1 parent fdfb1a0 commit 897dc70
Copy full SHA for 897dc70

File tree

Expand file treeCollapse file tree

2 files changed

+15
-7
lines changed
Filter options
Expand file treeCollapse file tree

2 files changed

+15
-7
lines changed

‎book/security.rst

Copy file name to clipboardExpand all lines: book/security.rst
+14-6Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2055,18 +2055,20 @@ to work correctly. Just pass a file name to enable it::
20552055
You can also access a secure random instance directly from the Symfony
20562056
dependency injection container; its name is ``security.secure_random``.
20572057

2058-
Checking Dependencies Security
2059-
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
2058+
.. _book-security-checking-vulnerabilities:
2059+
2060+
Checking for Known Security Vulnerabilities in Dependencies
2061+
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
20602062

20612063
.. versionadded:: 2.5
20622064
The ``security:check`` command was introduced in Symfony 2.5. This command is
20632065
included in ``SensioDistributionBundle``, which has to be registered in your
20642066
application in order to use this command.
20652067

2066-
When using lots of dependencies in your Symfony projects, odds are that some of
2067-
them contain security vulnerabilities. That's why Symfony includes a command
2068-
called ``security:check`` that checks whether any of your installed dependencies
2069-
contain a known security vulnerability:
2068+
When using lots of dependencies in your Symfony projects, some of them may
2069+
contain security vulnerabilities. That's why Symfony includes a command called
2070+
``security:check`` that checks your ``composer.lock`` file to find any known
2071+
security vulnerability in your installed dependencies:
20702072

20712073
.. code-block:: bash
20722074
@@ -2077,6 +2079,12 @@ update or replace compromised dependencies as soon as possible. Internally,
20772079
this command uses the public `security advisories database`_ published by the
20782080
FriendsOfPHP organization.
20792081

2082+
.. tip::
2083+
2084+
The ``security:check`` command terminates with a non-zero exit code if
2085+
any of your dependencies is affected by a known security vulnerability.
2086+
Therefore, you can easily integrate it in your build process.
2087+
20802088
Final Words
20812089
-----------
20822090

‎contributing/code/security.rst

Copy file name to clipboardExpand all lines: contributing/code/security.rst
+1-1Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ Security Advisories
9898
.. tip::
9999

100100
You can check your Symfony application for known security vulnerabilities
101-
using the ``security:check`` command.
101+
using the ``security:check`` command. See :doc:`</book/security/checking-vulnerabilities>`
102102

103103
This section indexes security vulnerabilities that were fixed in Symfony
104104
releases, starting from Symfony 1.0.0:

0 commit comments

Comments
0 (0)
Morty Proxy This is a proxified and sanitized view of the page, visit original site.