Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

urls leak through spoilers #4771

Open
HarHarLinks opened this issue Dec 20, 2021 · 2 comments
Open

urls leak through spoilers #4771

HarHarLinks opened this issue Dec 20, 2021 · 2 comments
Labels
A-Markdown A-Timeline O-Uncommon Most users are unlikely to come across this or unexpected workflow S-Minor Impairs non-critical functionality or suitable workarounds exist T-Defect Something isn't working: bugs, crashes, hangs and other reported problems

Comments

@HarHarLinks
Copy link
Contributor

Steps to reproduce

send /spoiler example.org

Outcome

What did you expect?

proper spoiler markup

What happened instead?

url leaks because it's blue

suggested solution: spoiler markup should apply not only background but also foreground color

Your phone model

No response

Operating system version

No response

Application version and app store

1.3.9

Homeserver

No response

Will you send logs?

No

@HarHarLinks HarHarLinks added the T-Defect Something isn't working: bugs, crashes, hangs and other reported problems label Dec 20, 2021
@ouchadam ouchadam added A-Markdown A-Timeline O-Uncommon Most users are unlikely to come across this or unexpected workflow S-Minor Impairs non-critical functionality or suitable workarounds exist labels Dec 20, 2021
@pr0927
Copy link

pr0927 commented Mar 14, 2022

I am seeing this problem too - also seeing it on numbers. Other plaintext works fine.

@Luka5W
Copy link

Luka5W commented Mar 20, 2023

Didn't work for me either. I didn't use /spoiler but /html <span data-mx-spoiler>…</span>

App Version: 1.5.26

Also, spoilers that contain phone numbers - or character combinations that Android thinks might be phone numbers - are visible. things that the app interprets as matrix.to links (e.g. @7:-), too (not good for sharing passwords :P).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
A-Markdown A-Timeline O-Uncommon Most users are unlikely to come across this or unexpected workflow S-Minor Impairs non-critical functionality or suitable workarounds exist T-Defect Something isn't working: bugs, crashes, hangs and other reported problems
Projects
None yet
Development

No branches or pull requests

4 participants