Changes to run laconic-console app with laconicd #75
@ -33,7 +33,7 @@ func PlaygroundHandler(apiURL string) http.HandlerFunc {
|
||||
|
||||
}
|
||||
w.Header().Set("Content-Type", "text/html")
|
||||
err := page.Execute(w, map[string]interface{}{
|
||||
"apiUrl": apiURL,
|
||||
![]() Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
![]() Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
"apiURL": apiURL,
|
||||
![]() Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
![]() Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
})
|
||||
if err != nil {
|
||||
panic(err)
|
||||
|
||||
![]() Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
![]() Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
![]() Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
![]() Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
@ -111,7 +111,7 @@ func (k Keeper) GetRecord(ctx sdk.Context, id string) (record types.Record) {
|
||||
store := ctx.KVStore(k.storeKey)
|
||||
result := store.Get(GetRecordIndexKey(id))
|
||||
k.cdc.MustUnmarshal(result, &record)
|
||||
return record
|
||||
return recordObjToRecord(store, record)
|
||||
}
|
||||
|
||||
// ListRecords - get all records.
|
||||
|
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Show more details
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Show more details
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Show more details
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Show more details