Skip to content

Instantly share code, notes, and snippets.

hints.addMode("i", "Show image",
function (elem) dactyl.open(elem.src || /url\("(.*?)"\)/.exec(DOM(elem).style.backgroundImage)[1]),
function (elem) elem instanceof HTMLImageElement || DOM(elem).style.backgroundImage != "none",
["*"]);
#!/bin/rc
. 9.rc
. rclib $*
getflags 'g,p,r,e expire,n nick,d desc,l lang'
ext=''
if (~ $flage '') flage = N
if (! ~ $flagl '') ext=.$flagl
name=stdin
if (! ~ $#argv 0)
let libc = ctypes.open("libc.so.6");
let write = libc.declare("write", ctypes.default_abi, ctypes.int, ctypes.int, ctypes.char.ptr, ctypes.int)
write(2, "foo\n", 4);
Function.prototype.apply.call(write, null, [2, "foo\n", 4]);
ifeq "$(shell uname -s)" "Darwin"
PYTHON=python
ABI_ARCH = x86_64
ifeq "$(GECKO_MAJOR)" ""
GECKO_MAJOR = 9
endif
GECKO_MINOR = 0
BASE,abcdefghijklmnopqrstuvwxyz,MAIN,abcdefghijklmnopqrstuvwxyz,COMMAND,abcdefijklmnoprstuvwxyz,NORMAL,ehqx,OPERATOR,acdimnopqrsuvxyz,VISUAL,afimno...::
0: BASE,abcdefghijklmnopqrstuvwxyz
1: MAIN,abcdefghijklmnopqrstuvwxyz
2: COMMAND,abcdefijklmnoprstuvwxyz
3: NORMAL,ehqx
4: OPERATOR,acdimnopqrsuvxyz
5: VISUAL,afimnopqrtuz
6: CARET,acdfimopqrstuxyz
7: TEXT_EDIT,mnqrz
8: OUTPUT_MULTILINE,abcdehilmnoprstuvwxyz
myExtension.$("[style='cursor:pointer;']", wnd.document).each(function(i) {
ez(/"(.+?)"/.exec(myExtension.$(this).attr("onclick"))[1], i++);
});
"use strict";
const MASK_CHAR = "×";
function passwordify(input, maskChar) {
maskChar = maskChar || MASK_CHAR;
function ignore() {}
function mask(node) {
node.textContent = node.textContent.replace(/./g, maskChar);
}
Components.classes["@mozilla.org/preferences-service;1"]
.getService(Components.interfaces.nsIPrefService)
.getBranch("extensions.renrenphotozoom.")
.setBoolPref("isAddonsActive", isValid);
Components.classes["@mozilla.org/preferences-service;1"]
.getService(Components.interfaces.nsIPrefService)
.getBranch("extensions.renrenphotozoom.")
.setBoolPref("hasLogedIn", isLogin);
Components.classes["@mozilla.org/preferences-service;1"]
<?xml version="1.0"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<style type="text/css"><![CDATA[
I'm sorry but this is disturbing... Rated 1 out of 5 stars
by Atavachron on October 28, 2011 #
While this add-on appears to have been rolled-back to the previous version, we are still all left scratching our heads as to what just happened. It looks as if we are going to have to scour the code of every updated Mozilla add-on in the future to make sure nothing shady has been added. But, I don't know how that is even possible.
We have no explanation as to what occurred or what the new code in this add-on actually did or if it had any lasting effects, and no guarantee that the version that is now on this page is really what it purports to be, namely the last available version before the one in question.
What if someone updates their add-on with suspicious code and simply doesn't announce it? I realize that new add-ons must be approved, but the security door seems to be wide-open with regard to updated add-ons in general.