From 9b2200acd6bd572eea00ea89eeb3b2c0764c8942 Mon Sep 17 00:00:00 2001 From: Bram Moolenaar Date: Mon, 20 Mar 2006 21:55:45 +0000 Subject: updated for version 7.0230 --- runtime/doc/eval.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'runtime/doc/eval.txt') diff --git a/runtime/doc/eval.txt b/runtime/doc/eval.txt index f842ff6897..fa1362a46d 100644 --- a/runtime/doc/eval.txt +++ b/runtime/doc/eval.txt @@ -7157,7 +7157,7 @@ This is not guaranteed 100% secure, but it should block most attacks. *sandbox-option* A few options contain an expression. When this expression is evaluated it may -have to be done in the sandbox to avoid a security risc. But the sandbox is +have to be done in the sandbox to avoid a security risk. But the sandbox is restrictive, thus this only happens when the option was set from an insecure location. Insecure in this context are: - sourcing a .vimrc or .exrc in the current directlry -- cgit v1.2.3