step which must be made through the filesystem to reach that directory
from the root is scrutinized for vulnerabilities. The checks made
against each directory and symbolic link along the way are as follows:
-.IP 1.
+.IP " 1."
No step should be a directory which is world-writable unless its sticky
bit is set, and it's not the final step.
-.IP 2.
+.IP " 2."
No step should be a directory which is group-writable unless its sticky
bit is set, and it's not the final step. (However, see the
.B \-t
option below.)
-.IP 3.
+.IP " 3."
No step should be a directory owned by another user (other than root).
-.IP 4.
+.IP " 4."
No step should be a symbolic link inside a sticky directory and owned by
another user.
.PP