Tobias Pfeiffer
Tobias Pfeiffer
@mrbrdo sure I did, benchmark is in the linked gist (comments), here it is: ``` tobi@airship ~ $ ruby ivar_get.rb Calculating ------------------------------------- direct 175.604k i/100ms hoist_ivar_name 125.430k i/100ms ivar get...
@enebo well, I wanted to say it's probably not worth the time :D And I love it when you give insights like that, I mostly don't understand all of it...
@mvz yea it used to work, it seems there is a workaround at capybara as detailed: https://github.com/teamcapybara/capybara/issues/2761 - but out of the box it still breaks (see the reproduction repo)...
I revisited it and found a manual workaround, I'm hoping to get capybara to fixing the proxy again but not sure https://github.com/teamcapybara/capybara/issues/2761#issuecomment-2184075535
:wave: Heyo, thanks for your contribution :green_heart: and sorry for not giving it attention earlier :( I'm a bit confused why the class was moved to the div from the...
Hey, thanks for the report. I'm not clear how this is an exploitable fault on SimpleCov's side. For this to be an exploitable vulnerability someone would already need to have...
Hi @garno , thanks for your willingness to work on this :green_heart: Sorry for my tardiness, basically there was/is a ton to work on and I decided to first tackle...
Thanks @colszowka for chiming in and yes agreed. I'm still very much interested in a more modern interface @garno if you still are as well :) Hence, reopening.
Hi, thanks for letting us know and we'll upgrade but as these are XSS vulnerabilities you'd need to look at somebody else's malicious code (as that's the user input we...
Of course it doesn't matter for it :D So, your problem is more that your security scanner nags you about it than the actual security risk.