Changes to run laconic-console app with laconicd #75
1
go.mod
@ -18,6 +18,7 @@ require (
|
||||
github.com/deckarep/golang-set v1.8.0
|
||||
github.com/ethereum/go-ethereum v1.10.26
|
||||
github.com/gibson042/canonicaljson-go v1.0.3
|
||||
github.com/go-chi/chi/v5 v5.0.7
|
||||
github.com/gogo/protobuf v1.3.3
|
||||
github.com/golang/protobuf v1.5.2
|
||||
github.com/gorilla/mux v1.8.0
|
||||
|
2
go.sum
@ -367,6 +367,8 @@ github.com/gin-gonic/gin v1.7.0/go.mod h1:jD2toBW3GZUr5UMcdrwQA10I7RuaFOl/SGeDjX
|
||||
github.com/glycerine/go-unsnap-stream v0.0.0-20180323001048-9f0cb55181dd/go.mod h1:/20jfyN9Y5QPEAprSgKAUr+glWDY39ZiUEAYOEv5dsE=
|
||||
github.com/glycerine/goconvey v0.0.0-20190410193231-58a59202ab31/go.mod h1:Ogl1Tioa0aV7gstGFO7KhffUsb9M4ydbEbbxpcEDc24=
|
||||
github.com/go-chi/chi/v5 v5.0.0/go.mod h1:BBug9lr0cqtdAhsu6R4AAdvufI0/XBzAQSsUqJpoZOs=
|
||||
github.com/go-chi/chi/v5 v5.0.7 h1:rDTPXLDHGATaeHvVlLcR4Qe0zftYethFucbjVQ1PxU8=
|
||||
github.com/go-chi/chi/v5 v5.0.7/go.mod h1:DslCQbL2OYiznFReuXYUmQ2hGd1aDpCnlMNITLSKoi8=
|
||||
github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU=
|
||||
github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
|
||||
github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8=
|
||||
|
165
gql/graphiql.go
Normal file
@ -0,0 +1,165 @@
|
||||
|
||||
package gql
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
import (
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
"html/template"
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
"net/http"
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
)
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
// GraphiQL is an in-browser IDE for exploring GraphiQL APIs.
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
// This handler returns GraphiQL when requested.
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
//
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
// For more information, see https://github.com/graphql/graphiql.
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
func PlaygroundHandler(apiURL string) http.HandlerFunc {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
return func(w http.ResponseWriter, r *http.Request) {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
if r.Method != "GET" {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
http.Error(w, "only GET requests are supported", http.StatusMethodNotAllowed)
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
return
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
w.Header().Set("Content-Type", "text/html")
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
err := page.Execute(w, map[string]interface{}{
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
"apiURL": apiURL,
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
})
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
if err != nil {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
panic(err)
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
// https://github.com/graphql/graphiql/blob/main/examples/graphiql-cdn/index.html
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
var page = template.Must(template.New("graphiql").Parse(`
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<!DOCTYPE html>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<html lang="en">
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<head>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<title>GraphiQL</title>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<style>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
body {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
height: 100%;
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
margin: 0;
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
width: 100%;
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
overflow: hidden;
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
#graphiql {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
height: 100vh;
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
</style>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<!--
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
This GraphiQL example depends on Promise and fetch, which are available in
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
modern browsers, but can be "polyfilled" for older browsers.
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
GraphiQL itself depends on React DOM.
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
If you do not want to rely on a CDN, you can host these files locally or
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
include them directly in your favored resource bundler.
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
-->
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<script
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
src="https://unpkg.com/react@17/umd/react.development.js"
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
integrity="sha512-Vf2xGDzpqUOEIKO+X2rgTLWPY+65++WPwCHkX2nFMu9IcstumPsf/uKKRd5prX3wOu8Q0GBylRpsDB26R6ExOg=="
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
crossorigin="anonymous"
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
></script>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<script
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
src="https://unpkg.com/react-dom@17/umd/react-dom.development.js"
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
integrity="sha512-Wr9OKCTtq1anK0hq5bY3X/AvDI5EflDSAh0mE9gma+4hl+kXdTJPKZ3TwLMBcrgUeoY0s3dq9JjhCQc7vddtFg=="
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
crossorigin="anonymous"
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
></script>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<!--
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
These two files can be found in the npm module, however you may wish to
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
copy them directly into your environment, or perhaps include them in your
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
favored resource bundler.
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
-->
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<link rel="stylesheet" href="https://unpkg.com/graphiql/graphiql.min.css" />
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
</head>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<body>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<div id="graphiql">Loading...</div>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<script
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
src="https://unpkg.com/graphiql/graphiql.min.js"
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
type="application/javascript"
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
></script>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
<script>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
// https://github.com/graphql/graphiql/blob/main/packages/graphiql/resources/renderExample.js
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
// Parse the search string to get url parameters.
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
var search = window.location.search;
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
var parameters = {};
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
search
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
.substr(1)
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
.split('&')
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
.forEach(function (entry) {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
var eq = entry.indexOf('=');
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
if (eq >= 0) {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
parameters[decodeURIComponent(entry.slice(0, eq))] = decodeURIComponent(
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
entry.slice(eq + 1),
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
);
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
});
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
// When the query and variables string is edited, update the URL bar so
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
// that it can be easily shared.
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
function onEditQuery(newQuery) {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
parameters.query = newQuery;
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
updateURL();
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
function onEditVariables(newVariables) {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
parameters.variables = newVariables;
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
updateURL();
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
function onEditHeaders(newHeaders) {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
parameters.headers = newHeaders;
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
updateURL();
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
function onTabChange(tabsState) {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
const activeTab = tabsState.tabs[tabsState.activeTabIndex];
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
parameters.query = activeTab.query;
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
parameters.variables = activeTab.variables;
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
parameters.headers = activeTab.headers;
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
updateURL();
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
function updateURL() {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
var newSearch =
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
'?' +
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
Object.keys(parameters)
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
.filter(function (key) {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
return Boolean(parameters[key]);
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
})
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
.map(function (key) {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
return (
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
encodeURIComponent(key) + '=' + encodeURIComponent(parameters[key])
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
);
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
})
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
.join('&');
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
history.replaceState(null, null, newSearch);
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
// Render <GraphiQL /> into the body.
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
// See the README in the top level of this module to learn more about
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
// how you can customize GraphiQL by providing different values or
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
// additional child elements.
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
ReactDOM.render(
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
React.createElement(GraphiQL, {
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
fetcher: GraphiQL.createFetcher({
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
url: {{.apiURL}}
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}),
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
query: parameters.query,
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
variables: parameters.variables,
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
headers: parameters.headers,
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
defaultHeaders: parameters.defaultHeaders,
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
onEditQuery: onEditQuery,
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
onEditVariables: onEditVariables,
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
onEditHeaders: onEditHeaders,
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
defaultEditorToolsVisibility: true,
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
isHeadersEditorEnabled: true,
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
shouldPersistHeaders: true,
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
onTabChange,
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
}),
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
document.getElementById('graphiql'),
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
);
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
</script>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
</body>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
</html>
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
||||
`))
|
||||
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections. ## Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/561)
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'. ## Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
[Show more details](https://github.com/cerc-io/laconicd/security/code-scanning/559)
|
@ -5,9 +5,10 @@ import (
|
||||
"net/http"
|
||||
|
||||
"github.com/99designs/gqlgen/graphql/handler"
|
||||
"github.com/99designs/gqlgen/graphql/playground"
|
||||
"github.com/cosmos/cosmos-sdk/client"
|
||||
"github.com/ethereum/go-ethereum/log"
|
||||
"github.com/go-chi/chi/v5"
|
||||
"github.com/rs/cors"
|
||||
"github.com/spf13/viper"
|
||||
)
|
||||
|
||||
@ -16,6 +17,16 @@ func Server(ctx client.Context) {
|
||||
if !viper.GetBool("gql-server") {
|
||||
return
|
||||
}
|
||||
|
||||
router := chi.NewRouter()
|
||||
|
||||
// Add CORS middleware around every request
|
||||
// See https://github.com/rs/cors for full option listing
|
||||
router.Use(cors.New(cors.Options{
|
||||
AllowedOrigins: []string{"*"},
|
||||
Debug: false,
|
||||
}).Handler)
|
||||
|
||||
logFile := viper.GetString("log-file")
|
||||
|
||||
port := viper.GetString("gql-port")
|
||||
@ -25,20 +36,20 @@ func Server(ctx client.Context) {
|
||||
logFile: logFile,
|
||||
}}))
|
||||
|
||||
http.Handle("/", playground.Handler("GraphQL playground", "/api"))
|
||||
router.Handle("/", PlaygroundHandler("/api"))
|
||||
|
||||
if viper.GetBool("gql-playground") {
|
||||
apiBase := viper.GetString("gql-playground-api-base")
|
||||
|
||||
http.Handle("/webui", playground.Handler("GraphQL playground", apiBase+"/api"))
|
||||
http.Handle("/console", playground.Handler("GraphQL playground", apiBase+"/graphql"))
|
||||
router.Handle("/webui", PlaygroundHandler(apiBase+"/api"))
|
||||
router.Handle("/console", PlaygroundHandler(apiBase+"/graphql"))
|
||||
}
|
||||
|
||||
http.Handle("/api", srv)
|
||||
http.Handle("/graphql", srv)
|
||||
router.Handle("/api", srv)
|
||||
router.Handle("/graphql", srv)
|
||||
|
||||
log.Info("Connect to GraphQL playground", "url", fmt.Sprintf("http://localhost:%s", port))
|
||||
err := http.ListenAndServe(":"+port, nil) //nolint: all
|
||||
err := http.ListenAndServe(":"+port, router) //nolint: all
|
||||
if err != nil {
|
||||
panic(err)
|
||||
}
|
||||
|
@ -111,7 +111,7 @@ func (k Keeper) GetRecord(ctx sdk.Context, id string) (record types.Record) {
|
||||
store := ctx.KVStore(k.storeKey)
|
||||
result := store.Get(GetRecordIndexKey(id))
|
||||
k.cdc.MustUnmarshal(result, &record)
|
||||
return record
|
||||
return recordObjToRecord(store, record)
|
||||
}
|
||||
|
||||
// ListRecords - get all records.
|
||||
|
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Show more details
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Show more details
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Insecure WebSocket Detected. WebSocket Secure (wss) should be used for all WebSocket connections.
Show more details
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Detected directly writing or similar in 'http.ResponseWriter.write()'. This bypasses HTML escaping that prevents cross-site scripting vulnerabilities. Instead, use the 'html/template' package and render data using 'template.Execute()'.
Show more details