We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
2 parents d249f67 + de14331 commit 816443eCopy full SHA for 816443e
src/libstd/sys/windows/ext/fs.rs
@@ -224,7 +224,7 @@ pub trait OpenOptionsExt {
224
/// opening a named pipe, to control to which degree a server process can
225
/// act on behalf of a client process (security impersonation level).
226
///
227
- /// When `security_qos_flags` is not set a malicious program can gain the
+ /// When `security_qos_flags` is not set, a malicious program can gain the
228
/// elevated privileges of a privileged Rust process when it allows opening
229
/// user-specified paths, by tricking it into opening a named pipe. So
230
/// arguably `security_qos_flags` should also be set when opening arbitrary
0 commit comments