From 73b85409ef2e58a9b4b9ce829948af3ab5bf80e6 Mon Sep 17 00:00:00 2001 From: Eric Chiang Date: Tue, 4 Jan 2022 16:43:39 -0800 Subject: [PATCH] *: fix typos and specify Go 1.17 requirement --- README.md | 10 +++++----- examples/parse.go | 2 +- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index b153c4b..c24718b 100644 --- a/README.md +++ b/README.md @@ -6,10 +6,10 @@ A log4j vulnerability filesystem scanner and Go package for analyzing JAR files. ## Installing -Pre-compiled binaries are available as [releases assets][releases]. +Pre-compiled binaries are available as [release assets][releases]. -To install from source with an existing [Go][go] installation, either use -[go install][go-install]: +To install from source with an existing [Go][go] v1.17+ installation, either +use [go install][go-install]: ``` go install github.com/google/log4jscanner@latest @@ -75,7 +75,7 @@ $ sudo log4jscanner --skip '/data/*' / ``` For heavy customization, such as reporting to external endpoints, much of the -tool's logic is exposed throught the [`jar.Walker`][jar-walker] API. +tool's logic is exposed through the [`jar.Walker`][jar-walker] API. [jar-walker]: https://pkg.go.dev/github.com/google/log4jscanner/jar#Walker @@ -113,7 +113,7 @@ func main() { result, err := jar.Parse(&rc.Reader) if err != nil { - log.Fatalf("parzing zip file: %v", err) + log.Fatalf("parsing zip file: %v", err) } if result.Vulnerable { fmt.Println("File is vulnerable") diff --git a/examples/parse.go b/examples/parse.go index 3a6fbad..2045561 100644 --- a/examples/parse.go +++ b/examples/parse.go @@ -52,7 +52,7 @@ func main() { result, err := jar.Parse(&rc.Reader) if err != nil { - log.Fatalf("parzing zip file: %v", err) + log.Fatalf("parsing zip file: %v", err) } if result.Vulnerable { fmt.Println("File is vulnerable")