You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/discover-external-assets-vulnerabilities/includes/3-discover-assets-recursive-discovery.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ Every asset receives a **state** that defines its relationship to your organizat
55
55
|-------|-------------|
56
56
|**Approved inventory**| Confirmed as owned by your organization; actively monitored and included in dashboard charts |
57
57
|**Candidate**| Has a connection to your seeds but needs manual review to confirm ownership |
58
-
|**Dependency**| Owned by a external but directly supports your approved assets (for example, a CDN or hosting provider) |
58
+
|**Dependency**| Owned by an external but directly supports your approved assets (for example, a CDN or hosting provider) |
59
59
|**Monitor only**| Relevant to your attack surface but not directly controlled—used for franchises or related entities |
60
60
|**Requires investigation**| Low-confidence connection; flagged for manual review to determine how it should be categorized |
0 commit comments