Skip to content

Commit a605952

Browse files
committed
fix: rename instructions link
1 parent 1f0e85a commit a605952

File tree

3 files changed

+3
-4
lines changed

3 files changed

+3
-4
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Now view at the site at `http://localhost:4567` or whichever port it is on.
1616

1717
## Play
1818

19-
Look at the running site and open the 'instructions' link to see what kind of text input you could enter to conduct a script injection attack.
19+
Look at the running site and open the 'hacking instructions' link to see what kind of text input you could enter to conduct a script injection attack.
2020

2121
Search within the code of this project (`*.rb` and `views/*.slim`) for 'XSS' -- you should find comments on how make modifications to prevent XSS attacks.
2222

app.rb

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,6 @@
6363
# form_action: %w['self'], # valid endpoints for form actions
6464
# frame_ancestors: %w['none'], # valid parents that may embed a page using the <frame> and <iframe> elements
6565
# object_src: %w['none'],
66-
# block_all_mixed_content: true, # see http://www.w3.org/TR/mixed-content/
6766

6867
# report_uri: %w[/report_csp_violation] # submit CSP violations by POST method
6968
# }

views/home.slim

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ div class="container"
1414
= " | "
1515
a href="/clear" clear all notes
1616
= " | "
17-
a data-toggle="collapse" href="#instructions" aria-expanded="false" aria-controls="instructions" instructions
17+
a data-toggle="collapse" href="#instructions" aria-expanded="false" aria-controls="instructions" hacking instructions
1818

1919
div class="container collapse" id="instructions"
2020
div class="row"
@@ -34,7 +34,7 @@ div class="container collapse" id="instructions"
3434
= "thief script<SCRIPT>alert('stolen: ' + document.getElementById('board').innerText);</SCRIPT>"
3535
.row
3636
.col-sm-12
37-
span Enter the following to simulate a cross-site resource forgery (CSRF) attempttextile:
37+
span Enter the following to simulate a cross-site resource forgery (CSRF) attempt:
3838
.row
3939
.col-sm-1
4040
.col-sm-11

0 commit comments

Comments
 (0)