Age | Commit message (Collapse) | Author |
|
The `title` function unsafely prints its input without sanitization, which if used
with custom user code that calls it, it could trigger command injection.
The `spectrum_ls` and `spectrum_bls` could similarly be exploited if a variable is
changed in the user's shell environment with a carefully crafted value. This is
highly unlikely to occur (and if possible, other methods would be used instead),
but with this change the exploit of these two functions is now impossible.
|
|
|
|
* use https everywhere
* use https links on the files that are left
Also, removed some broken links and updated redirections.
|
|
Make spectrum_ls implementation consistent with $FG and spectrum_bls
|
|
|
|
|
|
|
|
background.
We can easily see which color we want to set when changing the PS1 shell variable,
since the colors are more distinctive.
|
|
|
|
|
|
|