From 45d3f03d04168bec0f0f119891e5c214d6910dc4 Mon Sep 17 00:00:00 2001 From: Timon Christiansen <32591853+8BitJonny@users.noreply.github.com> Date: Tue, 26 Oct 2021 12:02:26 +0200 Subject: [PATCH 1/2] fixing duplicate curly bracket --- .../about-managing-vulnerable-dependencies.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/code-security/supply-chain-security/managing-vulnerabilities-in-your-projects-dependencies/about-managing-vulnerable-dependencies.md b/content/code-security/supply-chain-security/managing-vulnerabilities-in-your-projects-dependencies/about-managing-vulnerable-dependencies.md index 3c17791c93..84eecd773c 100644 --- a/content/code-security/supply-chain-security/managing-vulnerabilities-in-your-projects-dependencies/about-managing-vulnerable-dependencies.md +++ b/content/code-security/supply-chain-security/managing-vulnerabilities-in-your-projects-dependencies/about-managing-vulnerable-dependencies.md @@ -35,7 +35,7 @@ For more information, see "[About the dependency graph](/github/visualizing-repo By checking the dependency reviews on pull requests you can avoid introducing vulnerabilities from dependencies into your codebase. If the pull requests adds a vulnerable dependency, or changes a dependency to a vulnerable version, this is highlighted in the dependency review. You can change the dependency to a patched version before merging the pull request. For more information, see "[About dependency review](/code-security/supply-chain-security/about-dependency-review)." ## {% data variables.product.prodname_dependabot_alerts %} -{% data variables.product.product_name %}} can create {% data variables.product.prodname_dependabot_alerts %} when it detects vulnerable dependencies in your repository. The alert is displayed on the Security tab for the repository. The alert includes a link to the affected file in the project, and information about a fixed version. {% data variables.product.product_name %} also notifies the maintainers of the repository, according to their notification preferences. For more information, see "[About alerts for vulnerable dependencies](/code-security/supply-chain-security/about-alerts-for-vulnerable-dependencies)." +{% data variables.product.product_name %} can create {% data variables.product.prodname_dependabot_alerts %} when it detects vulnerable dependencies in your repository. The alert is displayed on the Security tab for the repository. The alert includes a link to the affected file in the project, and information about a fixed version. {% data variables.product.product_name %} also notifies the maintainers of the repository, according to their notification preferences. For more information, see "[About alerts for vulnerable dependencies](/code-security/supply-chain-security/about-alerts-for-vulnerable-dependencies)." {% ifversion fpt or ghec %} ## {% data variables.product.prodname_dependabot_security_updates %} From 230d4ba094231251e88f5c9543ec8a8940b11513 Mon Sep 17 00:00:00 2001 From: Samuel Sloniker Date: Tue, 26 Oct 2021 18:08:09 -0700 Subject: [PATCH 2/2] Update error-ssh-add-illegal-option----k.md Match the note in the text --- .../troubleshooting-ssh/error-ssh-add-illegal-option----k.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/authentication/troubleshooting-ssh/error-ssh-add-illegal-option----k.md b/content/authentication/troubleshooting-ssh/error-ssh-add-illegal-option----k.md index 067e2d6ca0..e62f06f827 100644 --- a/content/authentication/troubleshooting-ssh/error-ssh-add-illegal-option----k.md +++ b/content/authentication/troubleshooting-ssh/error-ssh-add-illegal-option----k.md @@ -22,7 +22,7 @@ The `-K` option is in Apple's standard version of `ssh-add`, which stores the pa To add your SSH private key to the ssh-agent, you can specify the path to the Apple version of `ssh-add`: ```shell - $ /usr/bin/ssh-add -K ~/.ssh/id_rsa + $ /usr/bin/ssh-add -K ~/.ssh/id_ed25519 ``` {% note %}