Skip to content

Commit 7c9dd93

Browse files
authored
Fix typo (#102)
1 parent e08e72b commit 7c9dd93

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Allowing people to execute their own SQL directly against your database is risky
44

55
Configured correctly, Django SQL Dashboard uses a number of measures to keep your data and your database server safe:
66

7-
- I strongly recommend creating a dedicated PostgreSQL role for accessing your database with read-only permissions granted to an allow-list of tables. PostgreSQL has extremely robust, well tested permissions which this tool can take dull advantage of.
7+
- I strongly recommend creating a dedicated PostgreSQL role for accessing your database with read-only permissions granted to an allow-list of tables. PostgreSQL has extremely robust, well tested permissions which this tool can take full advantage of.
88
- Likewise, configuring a PostgreSQL-enforced query time limit can reduce the risk of expensive queries affecting the performance of the rest of your site.
99
- Setting up a read-only reporting replica for use with this tool can provide even stronger isolation from other site traffic.
1010
- Your allow-list of tables should not include tables with sensitive information. Django's auth_user table contains password hashes, and the django_session table contains user session information. Neither should be exposed using this tool.

0 commit comments

Comments
 (0)