Title: fix: prevent arbitrary file write via symlink extraction (#133) · node-modules/compressing@8d16c19 · GitHub
Open Graph Title: fix: prevent arbitrary file write via symlink extraction (#133) · node-modules/compressing@8d16c19
X Title: fix: prevent arbitrary file write via symlink extraction (#133) · node-modules/compressing@8d16c19
Description: Everything you need for compressing and uncompressing - fix: prevent arbitrary file write via symlink extraction (#133) · node-modules/compressing@8d16c19
Open Graph Description: Add path traversal and symlink escape protection to prevent malicious TAR/TGZ archives from writing files outside the extraction directory. - Add isPathWithinParent() validation function - Validat...
X Description: Add path traversal and symlink escape protection to prevent malicious TAR/TGZ archives from writing files outside the extraction directory. - Add isPathWithinParent() validation function - Validat...
Opengraph URL: /node-modules/compressing/commit/8d16c196c7f1888fc1af957d9ff36117247cea6c
X: @github
Domain: github.com
| route-pattern | /:user_id/:repository/commit/:name(/*path) |
| route-controller | commit |
| route-action | show |
| fetch-nonce | v2:5e939236-1501-8582-40a0-642c3fa15394 |
| current-catalog-service-hash | f3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb |
| request-id | A944:E6C9E:0337:0443:698EE5B8 |
| html-safe-nonce | f85115f8820e7871f759b0fdc29c5cd00d041d0c39d65a5e92b157f83c8211cd |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJBOTQ0OkU2QzlFOjAzMzc6MDQ0Mzo2OThFRTVCOCIsInZpc2l0b3JfaWQiOiI2ODcyNjMwNTE1MDQxNDk0NDU2IiwicmVnaW9uX2VkZ2UiOiJpYWQiLCJyZWdpb25fcmVuZGVyIjoiaWFkIn0= |
| visitor-hmac | 5316ae278e0be4e5a14728011c57b20ecba875834433e35b7e251f5d02296327 |
| hovercard-subject-tag | repository:76440540 |
| github-keyboard-shortcuts | repository,commits,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/node-modules/compressing/commit/8d16c19 |
| twitter:image | https://opengraph.githubassets.com/587cf416c565aa879331e391ef924504b8c489181432e7bb511f510abbf7cf43/node-modules/compressing/commit/8d16c196c7f1888fc1af957d9ff36117247cea6c |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/587cf416c565aa879331e391ef924504b8c489181432e7bb511f510abbf7cf43/node-modules/compressing/commit/8d16c196c7f1888fc1af957d9ff36117247cea6c |
| og:image:alt | Add path traversal and symlink escape protection to prevent malicious TAR/TGZ archives from writing files outside the extraction directory. - Add isPathWithinParent() validation function - Validat... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| og:updated_time | 1769567018 |
| hostname | github.com |
| expected-hostname | github.com |
| None | cb2828a801ee6b7be618f3ac76fbf55def35bbc30f053a9c41bf90210b8b72ba |
| turbo-cache-control | no-cache |
| go-import | github.com/node-modules/compressing git https://github.com/node-modules/compressing.git |
| octolytics-dimension-user_id | 7125868 |
| octolytics-dimension-user_login | node-modules |
| octolytics-dimension-repository_id | 76440540 |
| octolytics-dimension-repository_nwo | node-modules/compressing |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | false |
| octolytics-dimension-repository_network_root_id | 76440540 |
| octolytics-dimension-repository_network_root_nwo | node-modules/compressing |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | e6b91a7e6e46287d26887e3fb7a4161657bab8f7 |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width