From f7bba0160ba01c87d40301cf1f0e7e2a057e17c1 Mon Sep 17 00:00:00 2001 From: Pradeep Kumar Date: Tue, 15 Feb 2022 19:20:15 -0800 Subject: [PATCH] PEP 675: use semicolon instead of comma (#2330) --- pep-0675.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pep-0675.rst b/pep-0675.rst index f270103dc..0226ba2ee 100644 --- a/pep-0675.rst +++ b/pep-0675.rst @@ -847,7 +847,7 @@ shell command: subprocess.run(f"echo 'Hello {name}'", shell=True) If user-controlled data is included in the command string, the code is -vulnerable to "command injection", i.e., an attacker can run malicious +vulnerable to "command injection"; i.e., an attacker can run malicious commands. For example, a value of ``' && rm -rf / #`` would result in the following destructive command being run: