web-security

Tag

Cards List
#web-security

@yaojingang: Open-sourced a website scanning skill: yao-websecurity-skill. I've learned that at least three public companies have deployed GEOFlow, and many friends have done various secondary developments based on this system, including commercial SaaS versions. Its security issues need to be taken seriously. Additionally, more and more...

X AI KOLs Timeline · 15h ago Cached

Open-sourced yao-websecurity-skill, an AI-based website security audit skill. It includes 275 security checks, supports static and dynamic audit modes, and automatically generates security scoring reports to help developers discover and fix security risks.

0 favorites 0 likes
#web-security

CSP Allow-list Experiment

Simon Willison's Blog · yesterday Cached

A web tool experiment demonstrating how to handle Content Security Policy errors in sandboxed iframes by intercepting fetch requests and prompting users to whitelist domains. The tool was built using GPT-5.5 via the Codex desktop app.

0 favorites 0 likes
#web-security

Notes on using GNU Emacs' Tramp system in an unusual shell environment

Lobsters Hottest · 4d ago Cached

The author explains that their blog is blocking requests from old or suspicious browser user agents to mitigate a surge in high-volume crawlers, likely for LLM training data. Specific instructions are provided for users of Vivaldi and Inoreader to adjust settings or report issues.

0 favorites 0 likes
#web-security

The React2Shell Story and What Happened Next.js

Lobsters Hottest · 4d ago Cached

This article details the discovery and disclosure of CVE-2025-5518 (React2Shell), a critical remote code execution vulnerability in React Server Components, explaining how researchers bypassed Flight protocol validations to access object prototypes.

0 favorites 0 likes
#web-security

datasette PR #2689: Replace token-based CSRF with Sec-Fetch-Site header protection

Simon Willison's Blog · 2026-04-14 Cached

Datasette PR #2689 replaces token-based CSRF protection with Sec-Fetch-Site header-based protection, inspired by Go 1.25 and Filippo Valsorda's research, simplifying CSRF handling by eliminating the need for hidden form tokens.

0 favorites 0 likes
← Back to home

Submit Feedback