diff --git a/src/main/resources/explanations/challenge44_hint.adoc b/src/main/resources/explanations/challenge44_hint.adoc index 9911b4375..4a3505d99 100644 --- a/src/main/resources/explanations/challenge44_hint.adoc +++ b/src/main/resources/explanations/challenge44_hint.adoc @@ -4,4 +4,3 @@ This challenge can be solved using the following steps: 2. Run 'kubectl exec secret-challenge-xxx -c secret-challenge -n default -- cat vault/secrets/challenge44' to print injected secrets from vault - diff --git a/src/main/resources/explanations/challenge44_reason.adoc b/src/main/resources/explanations/challenge44_reason.adoc index 7ff7d1d72..76641d484 100644 --- a/src/main/resources/explanations/challenge44_reason.adoc +++ b/src/main/resources/explanations/challenge44_reason.adoc @@ -5,4 +5,3 @@ there are situations where it might not be the best approach. Templates might accidentally expose sensitive information in logs or temporary files. If not properly configured, secrets could end up in places where they are accessible by unauthorized users or processes. -