From 1932b2d03a013e70b62b85743135f4c05b87b4dd Mon Sep 17 00:00:00 2001 From: Adam Outler Date: Fri, 2 Jan 2026 20:36:03 -0500 Subject: [PATCH] grammar-rabbit Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com> --- docs/docker-troubleshooting/PUID_PGID_SECURITY.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/docker-troubleshooting/PUID_PGID_SECURITY.md b/docs/docker-troubleshooting/PUID_PGID_SECURITY.md index 4a9ebcc4..89e52d21 100644 --- a/docs/docker-troubleshooting/PUID_PGID_SECURITY.md +++ b/docs/docker-troubleshooting/PUID_PGID_SECURITY.md @@ -2,7 +2,7 @@ ## Purpose -This short document explains the security rationale behind the root-priming entrypoint's validation of runtime user IDs (`PUID`) and group IDs (`PGID`). The validation is intentionally strict and is a safety measure to prevent environment-variable based command injection when running as root during the initial priming stage. +This short document explains the security rationale behind the root-priming entrypoint's validation of runtime user IDs (`PUID`) and group IDs (`PGID`). The validation is intentionally strict and is a safety measure to prevent environment-variable-based command injection when running as root during the initial priming stage. ## Key points