From 45ef6e1d753299d124b82f7ea480228a0d4d711b Mon Sep 17 00:00:00 2001 From: Matthew Newville Date: Tue, 13 Aug 2024 20:44:46 -0500 Subject: [PATCH] typo --- doc/motivation.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/motivation.rst b/doc/motivation.rst index 006adf2..df4c051 100644 --- a/doc/motivation.rst +++ b/doc/motivation.rst @@ -102,7 +102,7 @@ In 2024, an independent security audit of asteval done by Andrew Effenhauser, Ayman Hammad, and Daniel Crowley in the X-Force Security Research division of IBM showed insecurities with ``string.format``, so that access to this and ``string.format_map`` method were removed. In addition, this audit showed -thatZ the ``numpy`` submodules ``linalg``, ``fft``, and ``polynomial`` expose +that the ``numpy`` submodules ``linalg``, ``fft``, and ``polynomial`` expose many exploitable objects, so these submodules were removed by default. If needed, these modules can be added to any Interpreter either using the ``user_symbols`` argument when creating it, or adding the needed symbols to the