fix: detect 1337x invalid username response#2861
fix: detect 1337x invalid username response#2861kuishou68 wants to merge 2 commits intosherlock-project:masterfrom
Conversation
Automatic validation of changes
Failures were detected on at least one updated target. Commits containing accuracy failures will often not be merged (unless a rationale is provided, such as false negatives due to regional differences). |
The added error messages cause both F+ and F- CI checks to fail due to Cloudflare WAF blocking all requests in the CI environment. Reverts to the original detection pattern. Fixes sherlock-project#2815 Signed-off-by: Cocoon-Break <54054995+kuishou68@users.noreply.github.com>
|
Some change made here appears to have led to an unexpectedly large diff of +3,232 -3,225 |
Update & Rationale for CI FailuresAfter deeper investigation, I want to explain the F+ / F- failures from the original commit and recommend a path forward. Why the CI validation failed1337x.to is fully protected by Cloudflare WAF. All requests originating from GitHub Actions CI are intercepted and receive a Cloudflare challenge page (HTTP 403 / JS challenge) — regardless of whether the username exists or not. This means:
The RecommendationPR #2835 by @juliosuas takes the more correct approach: completely removing 1337x from the site list, since the site cannot be reliably used for username detection in any automated context. That PR also passes all CI checks. I'm happy to close this PR in favor of #2835 if the maintainers prefer that direction. Alternatively, I can add a Sorry for the confusion from the reverted commit — I should have included this rationale earlier. |
|
Was the target working locally, and only failing in CI? |
Summary
Self-review
Closes #2815