From d1f62b6ddd7b41ee4858849eecabecdd53f3278a Mon Sep 17 00:00:00 2001 From: Aaron Turner Date: Wed, 5 Feb 2025 14:02:52 -0800 Subject: [PATCH] Revert "Fix links from `Security` tab of repository." --- docs/security.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/security.md b/docs/security.md index 5e2e7d78..0cbcdcd8 100644 --- a/docs/security.md +++ b/docs/security.md @@ -10,11 +10,11 @@ Note: with the v2.x release, v1.x is no longer supported. ## Code signing -All commits by me are signed by my [commit signing GPG key](/docs/commit-sign-key.asc.md). +All commits by me are signed by my [commit signing GPG key](commit-sign-key.asc.md). ## Binary signatures -All releases have a corresponding detactched GPG signature using my [code signing GPG key](/docs/code-sign-key.asc.md). +All releases have a corresponding detactched GPG signature using my [code signing GPG key](code-sign-key.asc.md). ## Reporting a Vulnerability @@ -25,7 +25,7 @@ https://github.com/synfinatic/aws-sso-cli/issues/new?assignees=&labels=security& If you believe the public visibility of the information of the bug would place other `aws-sso` users at risk, then you may email me at: `synfinatic@gmail.com`. GPG encrypting your email in those situations is -encouraged and you should use [this GPG Key](/docs/commit-sign-key.asc.md). +encouraged and you should use [this GPG Key](commit-sign-key.asc.md). ## Security Model @@ -52,4 +52,4 @@ Running the [ECS Server in docker](ecs-server.md#running-the-ecs-server-in-the-b (`aws-sso ecs docker start`) will briefly expose your HTTP Authentication bearer token and SSL private key in clear text in `~/.aws-sso/mnt/`. If you are running it on a system where the `root` user is not trusted, this may not be acceptable. In such cases, it -is recommended to run `aws-sso ecs server` in a screen or tmux session. +is recommended to run `aws-sso ecs server` in a screen or tmux session. \ No newline at end of file