doc: markup ls as command role
Co-authored-by: Roberto Abdelkader Martínez Pérez <robertomartinezp@gmail.com>
This commit is contained in:
@@ -368,7 +368,7 @@ attacks**.
|
||||
|
||||
**This example is VULNERABLE to parameter injection**
|
||||
|
||||
In this example, an attacker can inject arbitrary parameters to ``ls``.
|
||||
In this example, an attacker can inject arbitrary parameters to :command:`ls`.
|
||||
|
||||
.. code-block:: console
|
||||
:linenos:
|
||||
|
||||
Reference in New Issue
Block a user