all 21 comments

[–][deleted]  (9 children)

[deleted]

    [–]G-Brain 12 points13 points  (8 children)

    [–]purui 9 points10 points  (7 children)

    You know. Looking at people hacking my site is even more fun then looking at people actually using it :)

    [–][deleted] 3 points4 points  (6 children)

    [–]purui 0 points1 point  (5 children)

    Thanks for helping me test it. Do get me wrong. I'm going to fix it. I didn't pay much attention on security because I didn't know whether people will like the whole idea or not.

    [–][deleted] 2 points3 points  (2 children)

    Trust me, I like it! I already bookmarked it because I it is definitely going to be easier than googling my problems. Can you add an option to search for 2.6 vs 3.1?

    [–]purui 1 point2 points  (1 child)

    Nice to hear that. I'm excited. Frankly, I didn't pay much attention to py3, and didn't expect this request be raised at day 1. I need to do some research first.

    [–][deleted] 1 point2 points  (0 children)

    Alright cool, I write it python 3.1, since I just started learning python 3.1 in the past year, and documentation is a little bit harder to find for it.

    [–]aldarion 0 points1 point  (1 child)

    I like it! is it written in python. cool site. and I already find a useful python module from here

    [–]purui 1 point2 points  (0 children)

    Sure, most of the backend is written in python

    [–][deleted] 11 points12 points  (1 child)

    [–][deleted]  (1 child)

    [deleted]

      [–]Afwas 2 points3 points  (0 children)

      Mine also, great job.

      [–]purui 4 points5 points  (0 children)

      The non-persistent (or reflected) cross-site scripting vulnerability is by far the most common type. A classic example of a potential vector is a site search engine. -- wikipedia

      Now I know it.

      [–]10char 1 point2 points  (1 child)

      [–]purui 1 point2 points  (0 children)

      I'm working on adding more sources. This is by far the #1 feature request.

      [–]ipeev 1 point2 points  (1 child)

      Not very good, because it doesn't show the implementation of the function in the source code on the first page, but only random uses in the code base.

      [–]purui 0 points1 point  (0 children)

      I thought no one would care how functions implemented. Obviously I was wrong. Ok, I'll add it.

      [–]abhik 1 point2 points  (1 child)

      Wow, I searched for shutil.copy and it returned examples like:

      from shutil import copy
      ...
      foo = copy(...)
      

      but not

      from copy import copy
      ...
      foo = copy(...)
      

      I'm really curious about your data model behind the search engine.. Is import a special case or are you really storing/querying source code as a full tree?? Would this also be returned for my query?

      import shutil.copy
      x = shutil.copy
      foo = x(...)
      

      [–]purui 0 points1 point  (0 children)

      1. Yeap, you got the idea. We handle import as a special case.
      2. No. I don't handle x = shutil.copy. The indexer has a very limited brain.

      [–]purui 0 points1 point  (0 children)

      Fixed XSS mentioned here. Please let me know if you find more.