Skip to content
This repository was archived by the owner on Mar 20, 2025. It is now read-only.

Conversation

@nico-shishkin
Copy link
Contributor

What changed


Pages to review

  • LinkToPage1
  • LinkToPage2

Remaining work

  • Technical review
  • Copy Review
  • Redirects:

Post launch

To be completed by the docs team upon merge:

  • Teams to update with the new information:
  • Replace original content on the support portal with 'this page has been moved to ...' - paste the URL
  • Update these log shipping pages in the app: - paste the URL

@netlify
Copy link

netlify bot commented Mar 29, 2023

Deploy Preview for logz-docs ready!

Name Link
🔨 Latest commit c3b45b8
🔍 Latest deploy log https://app.netlify.com/sites/logz-docs/deploys/642405c4634bed0008e4f345
😎 Deploy Preview https://deploy-preview-2317--logz-docs.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site settings.

{% include templates/footer.html %}

<script src="https://code.jquery.com/jquery-3.6.0.min.js"></script>
<script src="{{ 'js/tab_toc.js' | relative_url }}"></script>

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cycode: SAST violation: 'Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')'.

Detected a template variable used in a script tag. Although template variables are HTML escaped, HTML escaping does not always prevent cross-site scripting (XSS) attacks when used directly in JavaScript. If you need this data on the rendered page, consider placing it in the HTML portion (outside of a script tag). Alternatively, use a JavaScript-specific encoder, such as the one available in OWASP ESAPI. For Django, you may also consider using the 'json_script' template tag and retrieving the data in your script by using the element ID (e.g., document.getElementById).

Severity: Critical

Would you like to exclude this SAST violation from your status checks?
Tell us what to do with one of the following hashtags:

Tag Short Description
#cycode_sast_ignore_everywhere Applies to this SAST violation for all repos in your organization
#cycode_sast_ignore_here Applies to this request only
#cycode_sast_false_positive Applies to this SAST violation for all repos in your organization

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants