fix: message parser breaking workspace #40306
Layne — success
Found 6 issue(s): 0 critical, 0 high, 6 medium, 0 low.
Annotations
rc-layne / Layne Security Scan
[pi_agent] pi_agent/xss
[R79] Attacker-controlled attachment.text is rendered directly without MessageContentBody sanitization when text exceeds maxMessageParseSize or lacks markdown parsing
Check warning on line 16 in apps/meteor/client/components/message/hooks/useMaxMessageParseSize.ts
rc-layne / Layne Security Scan
[pi_agent] pi_agent/business-logic
[R16] No minimum value validation allows negative Message_MaxAllowedSize settings to force all messages to bypass markdown parsing and sanitization
Check warning on line 20 in apps/meteor/client/views/room/MessageList/hooks/useMessageBody.tsx
rc-layne / Layne Security Scan
[pi_agent] pi_agent/xss
[R18-R20] Attacker-controlled message.msg is returned directly without markdown parsing/sanitization when message exceeds maxMessageParseSize
rc-layne / Layne Security Scan
[pi_agent] pi_agent/xss
[R79] Attacker-controlled attachment.text is rendered directly without MessageContentBody sanitization when text exceeds maxMessageParseSize or lacks markdown parsing
Check warning on line 16 in apps/meteor/client/components/message/hooks/useMaxMessageParseSize.ts
rc-layne / Layne Security Scan
[pi_agent] pi_agent/business-logic
[R16] No minimum value validation allows negative Message_MaxAllowedSize settings to force all messages to bypass markdown parsing and sanitization
Check warning on line 20 in apps/meteor/client/views/room/MessageList/hooks/useMessageBody.tsx
rc-layne / Layne Security Scan
[pi_agent] pi_agent/xss
[R18-R20] Attacker-controlled message.msg is returned directly without markdown parsing/sanitization when message exceeds maxMessageParseSize