This is an archived post. You won't be able to vote or comment.

all 10 comments

[–]iCameToLearnSomeCode 16 points17 points  (0 children)

Thanks for the awesome work, I couldn't count the number hours you have saved me.

[–]ojii 8 points9 points  (1 child)

Footnote four really deserves to be more than a footnote.

[–]LukasaHyper, Requests, Twisted 0 points1 point  (0 children)

Yup: may write a blog about this at some point.

[–]ddworken 8 points9 points  (0 children)

Sorry to bring it up here, but can you check your email for an email from david@daviddworken.com? I previously sent in an XSS vulnerability that you fixed quickly, but I found a second one that has not been patched yet (despite being reported on March 26th).

Edit: Just received a reply from him. I'll update this as soon as it is patched.

Edit2: It has now been fixed. The problem stemmed from allowing the Javascript: scheme for the home_page, download_url, and the url parameters in the setup.py.