Skip to content

Commit 588e61c

Browse files
Merge pull request #18 from Innoptech/jeanchristopheruel-patch-1
Update README.md
2 parents 0032ca6 + d21be1f commit 588e61c

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -152,8 +152,8 @@ quad[:,1:4,:] *= scale # Avoid scaling normals
152152
To read STL file with a large triangle count > **1 000 000**, the openstl buffer overflow safety must be unactivated with
153153
`openstl.set_activate_overflow_safety(False)` after import. Deactivating overflow safety may expose the application
154154
to a potential buffer overflow attack vector since the stl standard is not backed by a checksum.
155-
This can cause significant risks if openstl is used as part of a service in a backend server for example. For
156-
domestic usage, ignore this warning.
155+
This can cause significant risks if openstl (and any other STL reader) is used as part of a service in a backend server for example. For
156+
domestic usage, ignore this warning. OpenSTl is the only stl reader to provide such default safety feature.
157157

158158
# C++ Usage
159159
### Read STL from file
@@ -263,4 +263,4 @@ The STL file format, while widely used for 3D modeling and printing, was designe
263263

264264
- Potential for Buffer Overflow Attacks: The lack of built-in validation and the absence of bounds checking in the STL format can make it susceptible to buffer overflow attacks. Care should be taken when handling STL files, especially those from untrusted sources, to ensure they are properly validated before being used.
265265

266-
These limitations are inherent to the STL format and should be considered when working with or implementing software that processes STL files. Developers are encouraged to implement additional validation and error-handling mechanisms in their applications to mitigate these risks.
266+
These limitations are inherent to the STL format and should be considered when working with or implementing software that processes STL files. Developers are encouraged to implement additional validation and error-handling mechanisms in their applications to mitigate these risks.

0 commit comments

Comments
 (0)