• Mic_Check_One_Two@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    1 year ago

    Honestly, the fact that kbin was open to injection attacks in the first place is hilarious. That’s like day 1 cybersecurity training.

    Anyone have the Bobby Tables xkcd handy?

    Edit: Found it.

    • melroy@kbin.melroy.orgOPM
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      1 year ago

      @Mic_Check_One_Two Actually it was just since recently the case. Kbin used to escape the content, of course… But after an upgrade to a newer Markdown parser version, it was overlooked in a PR.

      We are recently approved for the Codeberg CI, hopefully allowing us to setup a good CI/CD pipeline. Avoiding these kind of regressions in the first place. Kbin is still in beta.