This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"name": "Psyduck Testnet Stake Pool", | |
"description": "Psyduck Stake Pool, testnet stake pool to test new capabilites and configurations for Cardano stake pools", | |
"ticker": "PSYT", | |
"homepage": "https://gist.github.com/Eloi/252bdfc5c414187774cc2d0ceba71c52" | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
class TodoListsController < ApplicationController | |
before_action :set_current_user | |
def index | |
sort_by = params[:sort] || 'created_at' | |
sort_order = (params[:asc] == 'false') ? 'ASC' : 'DESC' | |
# COMMENT: Feeding unsanitized query params as string into the database is always A VERY BAD IDEA. Luckily in this example | |
# the attack vector seems restricted to the sorting, but who knows if there is any bug in the ActiveRecord order method | |
# that allows to widen the scale of the attach to a full SQL injection code. | |
# |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
if [ -n "$1" ]; then | |
if [ "$1" = "grab_id" ]; then | |
xdotool selectwindow >/tmp/autoreload_window_id | |
elif [ "$1" = "reload" ]; then | |
WINDOWID=`cat /tmp/autoreload_window_id` |