To prevent XSS attacks, we now properly escape any string containing the user's fullname. Enumerated by searching webview.py for "fullname", and "git grep"-ing any occurrences. This also exposed some unused strings, which I deleted for clarity.
| Name |
Last commit
|
Last update |
|---|---|---|
| .. | ||
| _about-accomplishments.html | Loading commit data... | |
| _about-edx.html | Loading commit data... | |
| _accomplishment-banner.html | Loading commit data... | |
| _accomplishment-footer.html | Loading commit data... | |
| _accomplishment-header.html | Loading commit data... | |
| _accomplishment-introduction.html | Loading commit data... | |
| _accomplishment-rendering.html | Loading commit data... | |
| _assets-secondary.html | Loading commit data... | |
| _badges-modal.html | Loading commit data... | |
| accomplishment-base.html | Loading commit data... | |
| invalid.html | Loading commit data... | |
| server-error.html | Loading commit data... | |
| valid.html | Loading commit data... |