Please report vulnerabilities by opening a GitHub issue or emailing danny.arends@gmail.com.
- Shell injection: all CGI arguments are escaped via
shellEscape()inrequest.d - Path traversal: requests are validated via
safePath()infilesystem.d - XSS: directory listings are sanitized via
htmlEscape()infilesystem.d - Request size: capped at 2MB in
client.d - Rate limiting: per-IP connection limiting in
server.d