Soon, people will join the strange and buggy world of YouTube alternative frontends
Because I wanted to try if others URI schemas were supported instead of http / https. file:// was a valid one. Don't worry, the day an attempt of data exfil will happen, you will not see it though your console logs.
Take a look at my answer there. It was my fault apparently.
TL;DR: I set the image channel icon to /etc/paswd and forgot about it, people saw a suspicious call and panicked, sorry.
For now I am pretty happy with zig, the semicolon mandatory is a bit annoying tho.
Is this, by any chance, originated from the sub called ignore me
?
In that case is probably my bad because is set as the image of the channel. I was playing with lemmy in the previous version and forgot about it, sorry.
I created that channel to investigate why the lemmy instance was hanging every time there was a symbol in the URL, added that URI as icon for fun and forgot about it.
That alert appears because your browser is trying to load an image with that path, nothing dangerous or remotely exploitable, don't worry.
Edit: I removed it so you shouldn't see the alert anymore.
P.S. no, it's not trying to steal anything, it's your browser trying to load that file as an image but instead of being let's say this url: https://beehaw.org/pictrs/image/c0e83ceb-b7e5-41b4-9b76-bfd152dd8d00.png
(this sub icon) , it's this one file:///etc/passwd
so you browser is doing the request to your own file.
Don't worry, nothing got compromised.
Data mining maps to geolocate stuff
Playing around with the SecureFlag platform, pretty interesting IMHO. Also want to start a new language to stick with, I am pretty undecided between Zig (but is not memory safe by design) elixir (functional programming still isn't my thing) and nim (can't handle any more language with indentation-based codeblocks).
Any suggestion is welcome, I will use them to build mostly security tools.
Why Russia thinks they cooperated with Apple when the agencies can just buy 0days from the resellers?
Especially Adblock 😵
Report quality (less FP) compared to semgrep, snyk and sonarcloud but a killer feature for me is that you get the call paths so you can see when and how a vulnerable dependency is called. Pretty useful on big codebases.
I used semgrep in the past, my team is still evaluating which tool for SAST to use as a standard internally but we are mostly oriented on CodeQL
Ye let’s go back to a single computer filling an entire room and printing output on paper