diff --git a/docs/hyperexecute-how-to-manage-project-level-secrets.md b/docs/hyperexecute-how-to-manage-project-level-secrets.md
index 93ec3159b..f21a91e53 100644
--- a/docs/hyperexecute-how-to-manage-project-level-secrets.md
+++ b/docs/hyperexecute-how-to-manage-project-level-secrets.md
@@ -45,7 +45,7 @@ Secrets in HyperExecute are encrypted environment variables used t
Managing sensitive information like API tokens, credentials, and access keys is crucial when running tests in HyperExecute. To address this, HyperExecute offers a Secrets Management system, and one of its powerful features is Project Level Secrets. This feature lets you define secrets scoped to a specific project, making secret handling more secure, easier, and collaborative for your teams.
## What Are Project Level Secrets?
-Project-level secrets are bound to a specific HyperExecute project instead of a user or account. When a job runs using that project ( referenced by id or both id and name in the YAML configuration, which is a sub-parameters of project parameter), the project-level secrets are automatically available to the test environment.
+Project-level secrets are bound to a specific HyperExecute project instead of a user or account. When a job runs using that project ( referenced by id or both id and name in the YAML configuration, which are sub-parameters of project parameter), the project-level secrets are automatically available to the test environment.
### Key Points
- Define secrets once per project.