Welcome to Codidact Meta!
Codidact Meta is the meta-discussion site for the Codidact community network and the Codidact software. Whether you have bug reports or feature requests, support questions or rule discussions that touch the whole network – this is the site for you.
Post History
Summarizing some discussion in Discord (Communities server, network-town-hall): the problem wasn't trichoplax or an IP issue but, rather, a code block that contains a script tag. Cloudflare is det...
Answer
#2: Post edited
Summarizing some discussion in Discord (Communities server, network-town-hall): the problem wasn't tricoplax or an IP issue but, rather, a code block that contains a `script` tag. Cloudflare is detecting that as an attempt to inject Javascript, apparently -- it doesn't detect the difference between something that could execute and something that's just shown in a code block. We'll need to do some more digging to figure out the best way to fix this. (I'm a little surprised we haven't run into this already on Software Development. Or maybe we did and someone gave up instead of reporting the problem.)Thanks to Moshi and triphoplax for the debugging.
- Summarizing some discussion in Discord (Communities server, network-town-hall): the problem wasn't trichoplax or an IP issue but, rather, a code block that contains a `script` tag. Cloudflare is detecting that as an attempt to inject Javascript, apparently — it doesn't detect the difference between something that could execute and something that's just shown in a code block. We'll need to do some more digging to figure out the best way to fix this. (I'm a little surprised we haven't run into this already on Software Development. Or maybe we did and someone gave up instead of reporting the problem.)
- Thanks to Moshi and trichoplax for the debugging.
#1: Initial revision
Summarizing some discussion in Discord (Communities server, network-town-hall): the problem wasn't tricoplax or an IP issue but, rather, a code block that contains a `script` tag. Cloudflare is detecting that as an attempt to inject Javascript, apparently -- it doesn't detect the difference between something that could execute and something that's just shown in a code block. We'll need to do some more digging to figure out the best way to fix this. (I'm a little surprised we haven't run into this already on Software Development. Or maybe we did and someone gave up instead of reporting the problem.) Thanks to Moshi and triphoplax for the debugging.