You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
NoScript detected a potential Cross-Site Scripting attack from [...] to https://stedolan.github.io
Suspicious data:
(URL) https://stedolan.github.io/jq/manual/v1.6/#map(x),map_values(x)
This happens even if I encode (), → %28%29%2C
Expected behavior
No warning from NoScript
Environment (please complete the following information):
Linux (xubuntu 20.04)
jq 1.6 (website)
Additional context
The text was updated successfully, but these errors were encountered:
I don't think this is caused by section ids but probably due to CDN resources without subresource integrity. Anyway the manual does nothing wrong, and you can configure NoScript extension to trust the URL. Hopefully resolved by #2628.
Describe the bug
Following
#name
links to jq manual website give NoScript XSS warnings in firefox.To Reproduce
The
map
description is at: https://stedolan.github.io/jq/manual/v1.6/#map(x),map_values(x)NoScript reports:
This happens even if I encode
(),
→%28%29%2C
Expected behavior
No warning from NoScript
Environment (please complete the following information):
Additional context
The text was updated successfully, but these errors were encountered: