You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Now, you have only one line of code to verify and can also use
685
+
Now, you have only one line of code to verify. You can also use
687
686
a testing framework such as ``pytest`` to test that the method is
688
687
correct.
689
688
@@ -759,7 +758,7 @@ to circumvent nested loops.
759
758
760
759
If the loop is too complicated for creating a list comprehension,
761
760
consider creating small functions and calling these instead. For
762
-
example to extract all consonants in a sentence:
761
+
example, to extract all consonants in a sentence:
763
762
764
763
.. tabs::
765
764
@@ -806,7 +805,7 @@ Security Considerations
806
805
Security, an ongoing process involving people and practices, ensures application confidentiality, integrity, and availability [#]_.
807
806
Any library should be secure and implement good practices that avoid or mitigate possible security risks.
808
807
This is especially relevant in libraries that request user input (such as web services).
809
-
Because security is a broad topic, we recommend you review this useful Python-specific resource:
808
+
Because security is a broad topic, you should review this useful Python-specific resource:
810
809
811
810
* `10 Unknown Security Pitfalls for Python <https://blog.sonarsource.com/10-unknown-security-pitfalls-for-python>`_ - By Dennis Brinkrolf - Sonar source blog
0 commit comments