Skip to content

Commit

Permalink
style: fix provence->provenance typo in threats
Browse files Browse the repository at this point in the history
Signed-off-by: Joshua Lock <joshua.lock@uk.verizon.com>
  • Loading branch information
joshuagl committed Jun 30, 2023
1 parent 5e7d274 commit ff697f2
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 4 deletions.
2 changes: 1 addition & 1 deletion docs/spec/v0.1/threats.md
Original file line number Diff line number Diff line change
Expand Up @@ -535,7 +535,7 @@ cryptographic secret that should only be available to the build service.
and only the control plane has access to cryptographic secrets. <sup>[[Isolated]
@ SLSA 3]</sup>

*Example:* Provence is signed on the build worker, which the adversary has
*Example:* Provenance is signed on the build worker, which the adversary has
control over. Adversary uses a malicious process that generates false provenance
and signs it using the provenance signing key. Solution: Builder generates and
signs provenance in the trusted control plane; the worker has no access to the
Expand Down
2 changes: 1 addition & 1 deletion docs/spec/v1.0-rc1/threats.md
Original file line number Diff line number Diff line change
Expand Up @@ -525,7 +525,7 @@ cryptographic secret that should only be available to the build service.
plane, and only the control plane has [access][non-forgeable] to cryptographic
secrets.

*Example:* Provence is signed on the build worker, which the adversary has
*Example:* Provenance is signed on the build worker, which the adversary has
control over. Adversary uses a malicious process that generates false provenance
and signs it using the provenance signing key. Solution: Builder generates and
signs provenance in the trusted control plane; the worker has no access to the
Expand Down
2 changes: 1 addition & 1 deletion docs/spec/v1.0-rc2/threats.md
Original file line number Diff line number Diff line change
Expand Up @@ -289,7 +289,7 @@ cryptographic secret that should only be available to the build service.
plane, and only the control plane has [access][unforgeable] to cryptographic
secrets.

*Example:* Provence is signed on the build worker, which the adversary has
*Example:* Provenance is signed on the build worker, which the adversary has
control over. Adversary uses a malicious process that generates false provenance
and signs it using the provenance signing key. Solution: Builder generates and
signs provenance in the trusted control plane; the worker has no access to the
Expand Down
2 changes: 1 addition & 1 deletion docs/spec/v1.0/threats.md
Original file line number Diff line number Diff line change
Expand Up @@ -291,7 +291,7 @@ cryptographic secret that should only be available to the build platform.
plane, and only the control plane has [access][unforgeable] to cryptographic
secrets.

*Example:* Provence is signed on the build worker, which the adversary has
*Example:* Provenance is signed on the build worker, which the adversary has
control over. Adversary uses a malicious process that generates false provenance
and signs it using the provenance signing key. Solution: Builder generates and
signs provenance in the trusted control plane; the worker has no access to the
Expand Down

0 comments on commit ff697f2

Please sign in to comment.