all: fix misspellings
Change-Id: Id9b0c6295a7cf1b170c383a4b9b0690dafe682b0
Reviewed-on: https://go-review.googlesource.com/c/exp/+/375055
Trust: Julie Qiu <julie@golang.org>
Run-TryBot: Julie Qiu <julie@golang.org>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Ian Lance Taylor <iant@golang.org>
Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
diff --git a/vulncheck/source.go b/vulncheck/source.go
index c195006..ad164af 100644
--- a/vulncheck/source.go
+++ b/vulncheck/source.go
@@ -299,7 +299,7 @@
var funNode *FuncNode
// If there are vulnerabilities for f, create node for f and
- // save it immediatelly. This allows us to include F in the
+ // save it immediately. This allows us to include F in the
// slice when analyzing chain V -> F -> V where V is vulnerable.
if len(vulns) > 0 {
funNode = funcNode(f)
diff --git a/vulncheck/vulncheck.go b/vulncheck/vulncheck.go
index 8561a6e..0adf96f 100644
--- a/vulncheck/vulncheck.go
+++ b/vulncheck/vulncheck.go
@@ -350,7 +350,7 @@
return packageVulns
}
-// VulnsForSymbol returns vulnerabilites for `symbol` in `mv.VulnsForPackage(importPath)`.
+// VulnsForSymbol returns vulnerabilities for `symbol` in `mv.VulnsForPackage(importPath)`.
func (mv moduleVulnerabilities) VulnsForSymbol(importPath, symbol string) []*osv.Entry {
vulns := mv.VulnsForPackage(importPath)
if vulns == nil {