Skip to content

Commit 91a0749

Browse files
updating REDOS url (#3344)
REDOS URL from owasp.org gives 404 now, I updated the URL for you Co-authored-by: XhmikosR <xhmikosr@gmail.com>
1 parent cc62f24 commit 91a0749

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

locale/en/docs/guides/dont-block-the-event-loop.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Unfortunately, in some cases the regexp match might require an exponential numbe
165165
An exponential number of trips means that if the engine requires `x` trips to determine a match, it will need `2*x` trips if we add only one more character to the input string.
166166
Since the number of trips is linearly related to the time required, the effect of this evaluation will be to block the Event Loop.
167167

168-
A *vulnerable regular expression* is one on which your regular expression engine might take exponential time, exposing you to [REDOS](https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS) on "evil input".
168+
A *vulnerable regular expression* is one on which your regular expression engine might take exponential time, exposing you to [REDOS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) on "evil input".
169169
Whether or not your regular expression pattern is vulnerable (i.e. the regexp engine might take exponential time on it) is actually a difficult question to answer, and varies depending on whether you're using Perl, Python, Ruby, Java, JavaScript, etc., but here are some rules of thumb that apply across all of these languages:
170170

171171
1. Avoid nested quantifiers like `(a+)*`. V8's regexp engine can handle some of these quickly, but others are vulnerable.

0 commit comments

Comments
 (0)