Skip to content

Conversation

@texpert
Copy link
Owner

@texpert texpert commented Jan 19, 2025

No description provided.

@texpert texpert changed the title Sanitize user fields and posts comments against XSS attacks Sanitize user fields, posts comments, and meta values against XSS attacks Jan 19, 2025
@texpert texpert marked this pull request as draft January 20, 2025 00:52
…the model, so use JSON.generate(value), which is not escaping, instead of value.to_json, which is using ActiveSupport's escaping method `to_json`
…ons to not automatically dismiss user prompts like alerts or modals. Also set increased `Capybara::Lockstep.timeout = 10` and `Capybara::Lockstep.timeout_with = :error`
…ove redundant `rails_helper` from all the specs. Also add `RSpec.` to specs' `describe` to avoid polluting the common object-space.
@texpert texpert force-pushed the sanitize-user-fields-and-post-comments-against-xss branch from dd9b052 to bc64da1 Compare February 26, 2025 17:05
@texpert texpert force-pushed the sanitize-user-fields-and-post-comments-against-xss branch from a4a9a03 to 257abfc Compare February 26, 2025 17:25
…`, because JSON.generate and fast_generate is escaping ActionController::Parameters
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants