Skip to content

Conversation

@conico974
Copy link
Contributor

Implement a new function to decode URL path components, ensuring validation against invalid characters and limiting decoding iterations to prevent potential DoS attacks.

I still need to figure out all the potential edge case as well as the desired behavior

@linear
Copy link

linear bot commented Jan 19, 2026

@changeset-bot
Copy link

changeset-bot bot commented Jan 19, 2026

⚠️ No Changeset found

Latest commit: 25d727d

Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.

This PR includes no changesets

When changesets are added to this PR, you'll see the packages that this PR includes changesets for and the associated semver types

Click here to learn what changesets are, and how to add one.

Click here if you're a maintainer who wants to add a changeset to this PR

@argos-ci
Copy link

argos-ci bot commented Jan 19, 2026

The latest updates on your projects. Learn more about Argos notifications ↗︎

Build Status Details Updated (UTC)
customers-v2 (Inspect) ⚠️ Changes detected (Review) 43 changed Jan 19, 2026, 7:09 PM
v2-cloudflare (Inspect) ⚠️ Changes detected (Review) 26 changed Jan 19, 2026, 7:13 PM
v2-vercel (Inspect) ⚠️ Changes detected (Review) 30 changed Jan 19, 2026, 7:14 PM

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants