-
-
Notifications
You must be signed in to change notification settings - Fork 160
Sanitize http header values to prevent injection #1072
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sanitize http header values to prevent injection #1072
Conversation
Co-authored-by: contact <contact@ophir.dev>
|
Cursor Agent can help with this pull request. Just |
|
@cursoragent sanitize should return a Cow, do not reallocate on the fast path and run the tests locally before you commit |
|
Perfect! I've addressed both issues from your feedback: Changes Made1. Optimized
|
Co-authored-by: contact <contact@ophir.dev>
|
@cursoragent fix merge conflicts |
✅ Merge Conflicts Resolved SuccessfullyI've successfully resolved the merge conflicts between your branch and Conflicts ResolvedTwo conflict areas in
Merged Changes from MainThe main branch introduced a new
Verification
Ready to PushThe branch is now 3 commits ahead of origin and ready to push: Learn more about Cursor Agents |
…t-injection-2d93 Resolved conflicts in src/render.rs by: - Keeping header value sanitization with Cow optimization - Using the new into_response_builder() method from main - Maintaining has_status flag updates from main
This pull request contains changes generated by Cursor background composer.