From 48c0d8da187ea890cb0da2cedd2c8361f2a16d8c Mon Sep 17 00:00:00 2001 From: hyunchel <3271191+hyunchel@users.noreply.github.com> Date: Fri, 8 Sep 2023 08:15:07 -0400 Subject: [PATCH] docs/fundamentals/security: fix typo (#28080) --- docs/fundamentals/security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/fundamentals/security.md b/docs/fundamentals/security.md index da6fc49fb5..1052355d2a 100644 --- a/docs/fundamentals/security.md +++ b/docs/fundamentals/security.md @@ -24,7 +24,7 @@ Exposing API endpoints towards "the internet", or any untrusted/hostile network, - Increase the risk of crashes due to OOM, - Increase the risk of not keeping up with chain progression, due to resource starvation (IO or CPU), -- Increase the risk of attemps to steal funds via spurious signing-requests (depending on what namespaces are exposed). +- Increase the risk of attempts to steal funds via spurious signing-requests (depending on what namespaces are exposed). We do not recommend exposing API endpoints publically, and any user who wishes to do so should carefully consider setting up proxies, WAFs, application level filtering, rate limiting, logging, tls terminator and monitoring to improve resilience.