Skip to content

Commit

Permalink
refactor: 💡 missav.commissav.ws
Browse files Browse the repository at this point in the history
  • Loading branch information
ChinaGodMan committed Feb 6, 2025
1 parent 02f6dd0 commit 2afbd69
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 6 deletions.
6 changes: 3 additions & 3 deletions missav-auto-login-helper/missav-auto-login-helper.user.js

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

6 changes: 3 additions & 3 deletions missav-explorer/missav-explorer.user.js
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
// @description:zh-CN 从当前missav页面获取图片文件和视频信息,并合并结果后提供下载生成的网页文件
// @license MIT
// @author 人民的勤务员 <[email protected]> & ChatGPT
// @match https://missav.com/*
// @match https://missav.ws/*
// @grant GM_setValue
// @grant GM_getValue
// @grant GM_xmlhttpRequest
Expand Down Expand Up @@ -261,7 +261,7 @@
console.log('Current page cookies:', cookies)

// 构建 API URL
const apiUrl = 'https://missav.com/api/playlists/dfe-057'
const apiUrl = 'https://missav.ws/api/playlists/dfe-057'

// 发送带有 cookies 的请求
GM_xmlhttpRequest({
Expand Down Expand Up @@ -806,7 +806,7 @@
WebDAVManager.uploadFile(webdavfold, `${sanitizeFileName(name)}.json`, JSON.stringify(finalData, null, 4))
}

const jsonIndexContent = generateJsonIndexContent(finalData);
const jsonIndexContent = generateJsonIndexContent(finalData)
allzip.file(`${sanitizeFileName(name)}.html`, jsonIndexContent)
finalData = []

Expand Down

1 comment on commit 2afbd69

@codethreat-sast-cloud
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚀 CodeThreat Security Scan Completed for UserScripts

Hello Team,

Great news! We've just completed a thorough security scan for UserScripts, and here's what we found:


Quick Overview

  • Duration: 00:00:42
  • Risk Score: F (This reflects the overall security posture based on the identified issues.)
  • Issues Fixed: 0 (The number of vulnerabilities resolved during this scan.)

🛠 Detailed Vulnerability Analysis

We've identified vulnerabilities across the codebase. Here's a detailed look:

Weakness Name Severity Count
Insecure Random Number Generator High 2
Detect Potential Xss In Template Literals Medium 39
Dynamic Code Execution Alert Critical 10
Redirection Input Validation Medium 1
Missing Timeout In Http Request Calls Low 3

🔗 Software Composition Analysis (SCA) Insights

package-lock.json

Severity Summary: Critical: 0 High: 0 Medium: 0 Low: 0

📈 Next Steps & Full Report

To dive deeper, click here to view the full report. It's essential to review these findings and plan the necessary fixes. If any of the critical/high issues need more discussion, let's set up a quick meeting to strategize our next steps.


🔒 Security isn't just a feature; it's a responsibility. Let's keep our codebase rock solid!

Please sign in to comment.