From 0d1169dabe508860370551890affb160d6a6b469 Mon Sep 17 00:00:00 2001 From: Martin Date: Wed, 18 Jun 2025 15:00:49 +0200 Subject: [PATCH] fix typo in link --- docs/security-assessment-mapping.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/security-assessment-mapping.md b/docs/security-assessment-mapping.md index 55e3aa8..bd52596 100644 --- a/docs/security-assessment-mapping.md +++ b/docs/security-assessment-mapping.md @@ -5,7 +5,7 @@ To assist in these broader security assessment capabilities, BloodHound queries This approach enables different security teams to leverage BloodHound's comprehensive attack path data for multiple kinds of risk validation, whether they're conducting red team assessments, blue team analysis, or compliance audits. -The BloodHound-centric mapping data is available at [security-assessment-mapping.json](/docs/security-assessmet-mapping.json) +The BloodHound-centric mapping data is available at [security-assessment-mapping.json](/docs/security-assessment-mapping.json) ## Assessment Coverage Overview