From d0be9d291f9302b374414428e09b288835789e65 Mon Sep 17 00:00:00 2001 From: Anton Sankov Date: Thu, 19 Jan 2023 19:23:40 +0200 Subject: [PATCH] Better wording --- 2023/day20.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2023/day20.md b/2023/day20.md index 35dd839..824381f 100644 --- a/2023/day20.md +++ b/2023/day20.md @@ -97,7 +97,7 @@ Now that we have a vulnerable application let's try to exploit it. ## Bonus: Image Scanning -We saw how an IAST solution helped us detect attacks in real time. +We saw how an IAST solution helped us detect attacks by observing the behaviour of the application. Let's see whether we could have done something to prevent these attacks in the first place. The vulnerable application we used for this demo was packages as a container.