| ▲ | guessmyname 4 hours ago | ||||||||||||||||||||||
Nice SQLi vulnerability you got there ;-) > making this project was the most fun I have had in some time haha! > sorryyyyy for vibe coding it though. Peace. I am only human after all […] Well, yes, of course the whole app was written by an LLM. I’m not surprised at all. --- Request:
Response: | |||||||||||||||||||||||
| ▲ | usefulposter 3 hours ago | parent [-] | ||||||||||||||||||||||
There's no vulnerability here. This is a client-side GitHub Pages app. GitHub Pages doesn't do server-side SQL execution. As your POST request shows, it's querying the hackernews_history table on Clickhouse Playground which is a big read-only demo environment. The information is public. "I can get the API wrapper to output more data" might be a quirk but it doesn't have security impact. https://play.clickhouse.com/play?user=play https://clickhouse.com/docs/getting-started/playground https://clickhouse.com/blog/announcing-the-new-sql-playgroun... | |||||||||||||||||||||||
| |||||||||||||||||||||||