Add test for Slashdot + fix style
[gofetch.git] / test / expected / SLASHDOT / 0102639752.header.html
1 <!DOCTYPE html>
2 <html>
3 <head>
4 <meta http-equiv='content-type' content='text/html; charset=utf-8'>
5 <meta name='viewport' content='width=device-width, initial-scale=1.0'>
6 <style type='text/css'>
7 body { margin: 1em 15%; }
8 </style>
9 </head>
10 <body>
11 <div class='story-header'>
12 <h1><a href='0102639752.html'>400,000 Websites Vulnerable Through Exposed .git Directories (scmagazine.com)</a></h1>
13 <div class='details'>(Thursday September 06, 2018 @11:30PM (msmash)
14 from the security-woes dept.)</div>
15 <br/>
16 <div class='content' style='text-align: justify'>
17 Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. From a report: Vladimir Smitka began his .git directory odyssey in July when he began looking at Czech websites to find how many were improperly configured and allow access to their .git folders within the file versions repository. Open .git directories are a particularly dangerous issue, he said, because they can contain a great deal of sensitive information. &quot;Information about the website&#x27;s structure, and sometimes you can get very sensitive data such as database passwords, API keys, development IDE settings, and so on. However, this data shouldn&#x27;t be stored in the repository, but in previous scans of various security issues, I have found many developers that do not follow these best practices,&quot; Smitka wrote. Smitka queried 230 million websites to discover the 390,000 allowing access to their .git directories. The vast majority of the websites with open directories had a .com TLD with .net, .de, .org and uk comprising most of the others.
18 </div>
19 <hr/>
20 </div>
21 </body>