diff --git a/rules/S7161/secrets/rule.adoc b/rules/S7161/secrets/rule.adoc index 2c7c2bdaccc..f525725c372 100644 --- a/rules/S7161/secrets/rule.adoc +++ b/rules/S7161/secrets/rule.adoc @@ -14,7 +14,7 @@ the least: 2. Personal access tokens (PAT) 3. "Credentials token", received after a SignIn request -Their scopes vary in terms of lifetime, access, and impact. +Their scopes vary in terms of lifetime, access, and privileges. Below are some real-world scenarios that illustrate some impacts of an attacker exploiting the secret. diff --git a/shared_content/secrets/impact/dataviz_takeover.adoc b/shared_content/secrets/impact/dataviz_takeover.adoc index 6bd9ad31083..deb4efcf309 100644 --- a/shared_content/secrets/impact/dataviz_takeover.adoc +++ b/shared_content/secrets/impact/dataviz_takeover.adoc @@ -1,4 +1,4 @@ -==== Dataviz Corruption and Takeover +==== Data visualization corruption and takeover With control over the {service_name} application, the attacker can modify dashboards, alter data sources, or inject malicious code. This can result in the