Skip to content

Conversation

@erseco
Copy link

@erseco erseco commented Jan 11, 2026

No description provided.

erseco and others added 29 commits January 8, 2026 20:37
…able-version-refactor

Integrates user theme management changes (CSS/JS handling for ELPX-imported themes)
with static mode refactoring (subdirectory deployment support).

Key changes merged:
- User theme CSS/JS inline loading for preview
- Static mode path handling for blob URL contexts
- ResourceFetcher user theme methods (setUserThemeFiles, getUserTheme, getUserThemeAsync)
- Static mode bundle URL generation

Co-Authored-By: Claude Opus 4.5 <[email protected]>
… into release/3.1-embedable-version-refactor
… into release/3.1-embedable-version-refactor
@github-actions
Copy link

github-actions bot commented Jan 11, 2026

PR Preview Action v1.8.0

QR code for preview link

🚀 View preview at
https://ateeducacion.github.io/exelearning/pr-preview/pr-18/

Built to branch gh-pages at 2026-01-11 22:22 UTC.
Preview will be ready when the GitHub Pages deployment is complete.

Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: ec576e4a31

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines +490 to +493
// Security: ensure the path is within staticDir
const normalizedPath = path.normalize(fullPath);
if (!normalizedPath.startsWith(staticDir)) {
return new Response('Forbidden', { status: 403 });

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Harden exe:// path containment check

The containment check normalizedPath.startsWith(staticDir) is a string-prefix test, so a crafted request like exe://../static-assets/secret normalizes to a sibling directory whose path still starts with the static prefix (e.g., /resources/static-assets/...) and will be served by net.fetch. This means any rendered content that can issue exe:// requests (user HTML, previews, etc.) can read files outside the intended static directory if a sibling directory shares the prefix. Use a path-based check such as path.relative(staticDir, normalizedPath) and ensure it doesn’t start with .. (or compare against staticDir + path.sep) to enforce true containment.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants