Go to file
Drew DeVault 6b0a06ba73 webhooks: HTML escape user content
This sounds like an XSS vulnerability, but really the only thing you can
exploit prior to this is silly things like putting an <h1> into commit
messages. These details were already sanitized at a later part of the
code.
2021-05-17 09:48:02 -04:00
.builds .builds/alpine: upgrade to 3.13 2021-02-08 10:31:09 -05:00
hubsrht webhooks: HTML escape user content 2021-05-17 09:48:02 -04:00
scss Improve btn-white on dark mode 2020-12-16 10:18:15 -05:00
.gitignore Initial commit 2020-03-24 10:26:15 -04:00
LICENSE Initial commit 2020-03-24 10:26:15 -04:00
Makefile Initial commit 2020-03-24 10:26:15 -04:00
README.md Initial commit 2020-03-24 10:26:15 -04:00
config.example.ini Add config.example.ini 2020-05-04 10:55:26 -04:00
hubsrht-initdb add database stamp for core.sr.ht 2020-08-11 10:48:01 -04:00
hubsrht-migrate hubsrht-migrate: remove (broken) core.sr.ht call 2020-07-14 09:32:19 -04:00
run.py Initial commit 2020-03-24 10:26:15 -04:00
setup.py Add pyyaml dependency 2021-04-02 13:56:19 -04:00
static Initial commit 2020-03-24 10:26:15 -04:00

README.md

This repository contains the code for the sr.ht project hub. For instructions on deploying or contributing to this project, visit the manual here:

https://man.sr.ht/hub.sr.ht/installation.md