Bug#907957: privacy-breach-generic: false positives for commented out javascript code

2018-09-10 Thread Chris Lamb
tags 907957 + moreinfo thanks Hi Thomas, > > /** > > * > src="http://domainB.com/users?theCallbackFunction=callback1";> > > */ > > would output that warning, even if this code never can possibly get executed

Bug#907957: privacy-breach-generic: false positives for commented out javascript code

2018-09-04 Thread Thomas Lamprecht
Package: lintian Version: 2.5.99 Severity: normal When packaging a JS file with a commented out script tag with src pointing to a http* resource, lintian falsely produces the 'privacy-breach-generic' warning. For example, a .js file in a package which includes: > /** > * src="

2 matches