diff options
| author | xyizko <[email protected]> | 2025-08-06 04:11:27 +0530 |
|---|---|---|
| committer | GitHub <[email protected]> | 2025-08-05 22:41:27 +0000 |
| commit | 1b08a6c063da803cb79e7d6df236f32d4b9a6a56 (patch) | |
| tree | 6db43293d8ca13d837313f38b5e13609c98e830b /docs/tools/shell.md | |
| parent | 82fa7a06600a71544a2d0200cb19588b273f21b3 (diff) | |
fix(minor): Grammar and Typos (#5053)
Co-authored-by: gemini-code-assist[bot] <176961590+gemini-code-assist[bot]@users.noreply.github.com>
Diffstat (limited to 'docs/tools/shell.md')
| -rw-r--r-- | docs/tools/shell.md | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/docs/tools/shell.md b/docs/tools/shell.md index 3e2a00e4..253e0218 100644 --- a/docs/tools/shell.md +++ b/docs/tools/shell.md @@ -137,6 +137,5 @@ To block all shell commands, add the `run_shell_command` wildcard to `excludeToo ## Security Note for `excludeTools` -Command-specific restrictions in -`excludeTools` for `run_shell_command` are based on simple string matching and can be easily bypassed. This feature is **not a security mechanism** and should not be relied upon to safely execute untrusted code. It is recommended to use `coreTools` to explicitly select commands +Command-specific restrictions in `excludeTools` for `run_shell_command` are based on simple string matching and can be easily bypassed. This feature is **not a security mechanism** and should not be relied upon to safely execute untrusted code. It is recommended to use `coreTools` to explicitly select commands that can be executed. |
