Decided to give Copilot a try and asked it to fix a problem with my code.
It deleted my code.
Well fucking played, Copilot.
Be sure to update Pleroma, it fixes a pretty major potential exploit.
To give context:
I found a huuuuuge exploit in Pleroma which (in my opinion) had the capacity to surpass the recent one in terms of damage to the userbase.
The reason for this simply being it did not require token hijacking and was able to be exploited by any user on any instance with around 30-40 lines of code.
It would have been super scary (scarier than spooky Kirino!!) But I sent it to the right people and an update has gone through that fixes it
You can all thank and give me praise later ^^
Also big ups to @cassidyclown for helping me run some tests when I first discovered the exploit and @mint for actually digging through the dumpster fire of a backend and submitting a merge request.
Fixing an issue with a React component whose job it is to handle the cookie consent banner. It's 3rd party so I'm looking at the implementation source code.
It's like dozens - I'm not joking - dozens of modules in package after package, including storybooks and test suites and whatnot.
I implemented a cookie consent banner in my side project in about 10 lines of Python code using HTMX, not including the HTML snippet.
This industry has become a joke.
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.