Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: fix scripts link #1128

Merged
merged 2 commits into from
Jun 30, 2023

docs: fix announcement link

4257996
Select commit
Loading
Failed to load commit list.
Merged

docs: fix scripts link #1128

docs: fix announcement link
4257996
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / Semgrep succeeded Jun 30, 2023 in 3s

No new alerts in code changed by this pull request

Annotations

Check warning on line 7 in docs/overrides/main.html

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.xss.mustache.var-in-href.var-in-href Warning documentation

Detected a template variable used in an anchor tag with the 'href' attribute. This allows a malicious actor to input the 'javascript:' URI and is subject to cross- site scripting (XSS) attacks. If using a relative URL, start with a literal forward slash and concatenate the URL, like this: href='/{{link}}'. You may also consider setting the Content Security Policy (CSP) header.

Check warning on line 7 in docs/overrides/main.html

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: python.django.security.audit.xss.template-href-var.template-href-var Warning documentation

Detected a template variable used in an anchor tag with the 'href' attribute. This allows a malicious actor to input the 'javascript:' URI and is subject to cross- site scripting (XSS) attacks. Use the 'url' template tag to safely generate a URL. You may also consider setting the Content Security Policy (CSP) header.

Check warning on line 7 in docs/overrides/main.html

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: python.flask.security.xss.audit.template-href-var.template-href-var Warning documentation

Detected a template variable used in an anchor tag with the 'href' attribute. This allows a malicious actor to input the 'javascript:' URI and is subject to cross- site scripting (XSS) attacks. Use 'url_for()' to safely generate a URL. You may also consider setting the Content Security Policy (CSP) header.