
Research
/Security News
Critical Vulnerability in NestJS Devtools: Localhost RCE via Sandbox Escape
A flawed sandbox in @nestjs/devtools-integration lets attackers run code on your machine via CSRF, leading to full Remote Code Execution (RCE).
Web crawler for checking the validity of your documents
apt install ruby-dev libxslt1-dev libxml2-dev
If you want complete local validation look tidy packages
gem install validate-website
validate-website [OPTIONS]
validate-website-static [OPTIONS]
validate-website -v -s https://www.ruby-lang.org/
validate-website -v -x tidy -s https://www.ruby-lang.org/
validate-website -v -x nu -s https://www.ruby-lang.org/
validate-website -h
validate-website is a web crawler for checking the markup validity with XML Schema / DTD and not found urls (more info doc/validate-website.adoc).
validate-website-static checks the markup validity of your local documents with XML Schema / DTD (more info doc/validate-website-static.adoc).
HTML5 support with libtidy5 or Validator.nu Web Service.
require 'validate_website/validator'
body = '<!DOCTYPE html><html></html>'
v = ValidateWebsite::Validator.new(Nokogiri::HTML(body), body)
v.valid? # => false
You can add this Rake task to validate a jekyll site:
desc 'validate _site with validate website'
task validate: :build do
Dir.chdir("_site") do
system("validate-website-static",
"--verbose",
"--exclude", "examples",
"--site", HTTP_URL)
exit($?.exitstatus)
end
end
end
If the libtidy5 is found on your system this will be the default to validate your html5 document. This does not depend on a tier service everything is done locally.
nokogiri can validate html5 document without tier service but reports less errors than tidy.
When --html5-validator nu
option is used HTML5 support is done by using the
Validator.nu Web Service, so the content of your webpage is logged by a tier.
It's not the case for other validation because validate-website use the XML
Schema or DTD stored on the data/ directory.
Please read http://about.validator.nu/#tos for more info on the HTML5 validation service.
You can download validator jar and start it with:
java -cp PATH_TO/vnu.jar nu.validator.servlet.Main 8888
Then you can use validate-website option:
--html5-validator-service-url http://localhost:8888/
# or
export VALIDATOR_NU_URL="http://localhost:8888/"
This will prevent you to be blacklisted from validator webservice.
With standard environment:
bundle exec rake
See GitHub.
The MIT License
Copyright (c) 2009-2022 Laurent Arnoud laurent@spkdev.net
FAQs
Unknown package
We found that validate-website demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
A flawed sandbox in @nestjs/devtools-integration lets attackers run code on your machine via CSRF, leading to full Remote Code Execution (RCE).
Product
Customize license detection with Socket’s new license overlays: gain control, reduce noise, and handle edge cases with precision.
Product
Socket now supports Rust and Cargo, offering package search for all users and experimental SBOM generation for enterprise projects.