From 69a2a026ae81a87b2ae0b36dcd1800cf7251151f Mon Sep 17 00:00:00 2001 From: Daniel Jacobs Date: Fri, 7 Jun 2024 12:53:16 -0400 Subject: [PATCH] chore: Fix subject-verb agreement --- web/packages/core/src/ruffle-imports.ts | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/web/packages/core/src/ruffle-imports.ts b/web/packages/core/src/ruffle-imports.ts index 821e3c33ceee..0f7c5231a9d7 100644 --- a/web/packages/core/src/ruffle-imports.ts +++ b/web/packages/core/src/ruffle-imports.ts @@ -70,7 +70,7 @@ export function copyToAudioBufferInterleaved( export function callExternalInterface(name: string, args: any[]): any { // [NA] Yes, this is direct eval. Yes, this is a Bad Thing when it comes to security. // In fact, yes this is vulnerable to an XSS attack! - // But plot twist: Flash allowed for this and many games *relies on it*. :( + // But plot twist: Flash allowed for this and many games *rely on it*. :( // Flash content can do `call("eval", "....")` regardless, this doesn't enable anything that wasn't already permitted. // It just goes against what the documentation says, and *looks* really suspicious. // Content can only run this if the website has enabled `allowScriptAccess`, so it has to be enabled by the website too.