Skip to content

Comments

Fix/deceptive url security#1066

Open
LeonmanRolls wants to merge 10 commits intomainfrom
fix/deceptive-url-security
Open

Fix/deceptive url security#1066
LeonmanRolls wants to merge 10 commits intomainfrom
fix/deceptive-url-security

Conversation

@LeonmanRolls
Copy link
Member

No description provided.

LeonmanRolls and others added 9 commits September 8, 2025 11:36
- Add comprehensive URL validation to detect deceptive patterns
- URLs with @ symbols, Unicode spaces, javascript:, data:, file:// protocols are disabled
- Deceptive URLs are displayed with strikethrough and are non-clickable
- Added tests for URL validation logic
- Updated ProfileSnippet, SocialProfileButton, and OtherProfileButton components

This prevents attacks where malicious actors could use URLs like:
- https://google.com   @evil.com (appears as google.com but redirects to evil.com)
- URLs with invisible Unicode characters hiding malicious redirects
- XSS attempts via javascript: or data: URIs

🤖 Generated with Claude Code

Co-Authored-By: Claude <noreply@anthropic.com>
@sonarqubecloud
Copy link

sonarqubecloud bot commented Oct 6, 2025

Quality Gate Failed Quality Gate failed

Failed conditions
C Reliability Rating on New Code (required ≥ A)

See analysis details on SonarQube Cloud

Catch issues before they fail your Quality Gate with our IDE extension SonarQube for IDE

@storywithoutend storywithoutend self-requested a review as a code owner November 26, 2025 13:08
@sonarqubecloud
Copy link

Quality Gate Failed Quality Gate failed

Failed conditions
C Reliability Rating on New Code (required ≥ A)

See analysis details on SonarQube Cloud

Catch issues before they fail your Quality Gate with our IDE extension SonarQube for IDE

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants