Crates.io | jsdoctest |
lib.rs | jsdoctest |
version | 0.4.0 |
source | src |
created_at | 2018-04-15 00:43:42.66556 |
updated_at | 2018-04-15 19:44:51.442091 |
description | testing javascript injection |
homepage | |
repository | |
max_upload_size | |
id | 60645 |
size | 5,173 |
A variety of tests for malicious code injection.
Everything here is safe to click (brson). Anyl local paths work on Win 10.
Case matters:
an inline html that invokes a script:
click mean inline script:
inline html with script onclick: click me
js image:
local file:
local text file:
regular non-local image:
non-local html served as image:
non-local html served as gif (I actually can't trick GitHub inter serving this as non-html ContentType)
non-local html served as gif (I actually can't trick GitHub inter serving this as non-html ContentType)
(I can't actually find a service that will serve a .jpg-named html as mimetype text/html - and the browser mime sniffer would probably figure it out anyway)