From 850d93ed62c83506712ae7cebd68eafb15fc39b2 Mon Sep 17 00:00:00 2001 From: Adam Outler Date: Fri, 2 Jan 2026 20:36:19 -0500 Subject: [PATCH] grammar-rabbit Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com> --- docs/PUID_PGID_SECURITY.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/PUID_PGID_SECURITY.md b/docs/PUID_PGID_SECURITY.md index a68418e2..3946fe91 100644 --- a/docs/PUID_PGID_SECURITY.md +++ b/docs/PUID_PGID_SECURITY.md @@ -2,7 +2,7 @@ ## Purpose -This short document explains the security rationale behind the root-priming entrypoint's validation of runtime user IDs (`PUID`) and group IDs (`PGID`). The validation is intentionally strict and is a safety measure to prevent environment-variable based command injection when running as root during the initial priming stage. +This short document explains the security rationale behind the root-priming entrypoint's validation of runtime user IDs (`PUID`) and group IDs (`PGID`). The validation is intentionally strict and is a safety measure to prevent environment-variable-based command injection when running as root during the initial priming stage. ## Key points