From 0d3a097f718adcefb2d8708d33b697a0c92dffbe Mon Sep 17 00:00:00 2001 From: forresst Date: Mon, 1 Feb 2021 09:02:01 +0100 Subject: [PATCH] Sync original --- README.french.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/README.french.md b/README.french.md index 92f1adfc..605ead98 100644 --- a/README.french.md +++ b/README.french.md @@ -881,15 +881,15 @@ Toutes les déclarations ci-dessus renverront false si elles sont utilisées ave

-## ![✔] 6.11. Support blacklisting JWTs +## ![✔] 6.11. Support blocklisting JWTs -**TL;DR:** When using JSON Web Tokens (for example, with [Passport.js](https://github.com/jaredhanson/passport)), by default there's no mechanism to revoke access from issued tokens. Once you discover some malicious user activity, there's no way to stop them from accessing the system as long as they hold a valid token. Mitigate this by implementing a blacklist of untrusted tokens that are validated on each request. +**TL;DR:** When using JSON Web Tokens (for example, with [Passport.js](https://github.com/jaredhanson/passport)), by default there's no mechanism to revoke access from issued tokens. Once you discover some malicious user activity, there's no way to stop them from accessing the system as long as they hold a valid token. Mitigate this by implementing a blocklist of untrusted tokens that are validated on each request. **Otherwise:** Expired, or misplaced tokens could be used maliciously by a third party to access an application and impersonate the owner of the token. -🔗 [**Read More: Blacklist JSON Web Tokens**](/sections/security/expirejwt.md) +🔗 [**Read More: Blocklist JSON Web Tokens**](/sections/security/expirejwt.md)

@@ -1052,7 +1052,7 @@ Toutes les déclarations ci-dessus renverront false si elles sont utilisées ave -**TL;DR:** Precautions should be taken to avoid the risk of accidentally publishing secrets to public npm registries. An `.npmignore` file can be used to blacklist specific files or folders, or the `files` array in `package.json` can act as a whitelist. +**TL;DR:** Precautions should be taken to avoid the risk of accidentally publishing secrets to public npm registries. An `.npmignore` file can be used to ignore specific files or folders, or the `files` array in `package.json` can act as an allow list. **Otherwise:** Your project's API keys, passwords or other secrets are open to be abused by anyone who comes across them, which may result in financial loss, impersonation, and other risks.