You are viewing a single comment's thread from:

RE: ㅤ

in DBuzz3 years ago

@savvytester Your post contains some text that could be a potential attempt to inject malicious code.

Investigation in progress..

Please forgive any false positives.
More info: https://hive.blog/hive-139531/@keys-defender/new-feature-code-injections-attempts-detection-xss-sql-injections-csrf
This message is self-voted to be more visible among others.

@keys-defender
Sort:  

Do you mean the harmless <script>alert();</script> testing code I posted about 8 days ago before replacing it with a tiny white pixel 5 minutes after? 🤔

!PIZZA

Yep.

could be a potential attempt to inject malicious code

Common way to test for XSS's to then exploit with a malicious script

If someone wants to test for cross-site scripts, then they could just search for similar codes posted by others on the Hive blockchain without needing to publish a test post or comment. 🤔

What I did was just to see if some JS code can be prevented from executing by certain Hive frontends (especially D.Buzz) while editing the content. 🤔 Trying to edit a post or comment on those frontends is not possible unless you are logged in to the user's account. 🤓

!PIZZA

Yep, understood.

By the way, check out my play-to-earn 3D game that is going to launch on Hive before the end of July:
@cryptoshots.nft

Hive NFTs -> https://hive.crypto-shots.com