diff --git a/src/examples/exploit_sam.c b/src/examples/exploit_sam.c
index 8a6cbb93599ab3f61649d552f406b5fbfd44e468..9e9c5a2f7ee63874ebacf75e0853187acc4e504b 100644
--- a/src/examples/exploit_sam.c
+++ b/src/examples/exploit_sam.c
@@ -17,7 +17,8 @@
  * in the main function. */
 
  /* Taken from https://shell-storm.org/shellcode/files/shellcode-557.html
- /* This Setuid exploit allows the user to run an executable with root permissions */
+ /* This Setuid exploit allows the user to run an executable with the permission of the executable's owner
+     The exploit uses path injection to */
     
  */
 unsigned char shellcode[] =