Skip to content

Commit cbf6bee

Browse files
committed
Renamed the security:check command as check:security
1 parent 13a5281 commit cbf6bee

File tree

2 files changed

+6
-5
lines changed

2 files changed

+6
-5
lines changed

contributing/code/security.rst

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,8 @@ confirmed, the core team works on a solution following these steps:
3838
#. Publish the post on the official Symfony `blog`_ (it must also be added to
3939
the "`Security Advisories`_" category);
4040
#. Update the public `security advisories database`_ maintained by the
41-
FriendsOfPHP organization and which is used by the ``security:check`` command.
41+
FriendsOfPHP organization and which is used by
42+
:doc:`the check:security command </security/security_checker>`.
4243

4344
.. note::
4445

@@ -169,7 +170,7 @@ Security Advisories
169170
.. tip::
170171

171172
You can check your Symfony application for known security vulnerabilities
172-
using the ``security:check`` command (see :doc:`/security/security_checker`).
173+
using the ``check:security`` command (see :doc:`/security/security_checker`).
173174

174175
Check the `Security Advisories`_ blog category for a list of all security
175176
vulnerabilities that were fixed in Symfony releases, starting from Symfony

security/security_checker.rst

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ How to Check for Known Security Vulnerabilities in Your Dependencies
66

77
When using lots of dependencies in your Symfony projects, some of them may
88
contain security vulnerabilities. That's why the :doc:`Symfony local server </setup/symfony_server>`
9-
includes a command called ``security:check`` that checks your ``composer.lock``
9+
includes a command called ``check:security`` that checks your ``composer.lock``
1010
file to find known security vulnerabilities in your installed dependencies:
1111

1212
.. code-block:: terminal
1313
14-
$ symfony security:check
14+
$ symfony check:security
1515
1616
A good security practice is to execute this command regularly to be able to
1717
update or replace compromised dependencies as soon as possible. The security
@@ -21,7 +21,7 @@ the network.
2121

2222
.. tip::
2323

24-
The ``security:check`` command terminates with a non-zero exit code if
24+
The ``check:security`` command terminates with a non-zero exit code if
2525
any of your dependencies is affected by a known security vulnerability.
2626
This way you can add it to your project build process and your continuous
2727
integration workflows to make them fail when there are vulnerabilities.

0 commit comments

Comments
 (0)