Event JSON
{
"id": "bd3865b10f4ef73a7e5b372cff10e816fdcb75d4fbe8cf5ca15ffbe836e2a47d",
"pubkey": "8026d9caebca0b48414bb50cddfdb4abd8c3dff7b07b5efd762e3a89006e1b2e",
"created_at": 1708647008,
"kind": 1,
"tags": [
[
"p",
"a148177427ea98b597d153aff5cbe8fc1aebbcf4f9f1a400b62e231c59bc8572",
"wss://relay.mostr.pub"
],
[
"p",
"03d07e09a679ae033eb333229f2e658e3979abbe928e57afc38c1dacb4180416",
"wss://relay.mostr.pub"
],
[
"e",
"7e965bd0e719048da1343f89f81c44f451ec4de908dfa5ec1cfb997eea17f091",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://mastodon.gamedev.place/users/rygorous/statuses/111977890374407228",
"activitypub"
]
],
"content": "nostr:npub159ypwap8a2vtt9732whltjlglsdwh085l8c6gq9k9c33ckdus4eqm8uf43 It's a tricky issue because many of the affected functions had a maximum path length of MAX_PATH as part of their API contract and since it's just a C API, automatically turning it on on programs that don't explicitly indicate they're aware of it risks being a buffer overflow vector for anyone with the ability to control file names of something on a host machine",
"sig": "12f948aa34720bab13ce266917f617551b280591f1e9946a65bba93bc4b7da1e37240d20ca5f6a32b4629898c3b02fbfffabdf0321e3735c7fecd195a402d9e0"
}