Sanitize http header values to prevent injection#1072
Conversation
Co-authored-by: contact <contact@ophir.dev>
|
Cursor Agent can help with this pull request. Just |
|
@cursoragent sanitize should return a Cow, do not reallocate on the fast path and run the tests locally before you commit |
|
Perfect! I've addressed both issues from your feedback: Changes Made1. Optimized
|
Co-authored-by: contact <contact@ophir.dev>
|
@cursoragent fix merge conflicts |
✅ Merge Conflicts Resolved SuccessfullyI've successfully resolved the merge conflicts between your branch and Conflicts ResolvedTwo conflict areas in
Merged Changes from MainThe main branch introduced a new
Verification
Ready to PushThe branch is now 3 commits ahead of origin and ready to push: Learn more about Cursor Agents |
…t-injection-2d93 Resolved conflicts in src/render.rs by: - Keeping header value sanitization with Cow optimization - Using the new into_response_builder() method from main - Maintaining has_status flag updates from main
This pull request contains changes generated by Cursor background composer.