Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

honey bypass for legit automation #75

Open
jeffbrl opened this issue Sep 3, 2024 · 0 comments
Open

honey bypass for legit automation #75

jeffbrl opened this issue Sep 3, 2024 · 0 comments

Comments

@jeffbrl
Copy link

jeffbrl commented Sep 3, 2024

The devs for my company's website employ honeypot to protect against contact form span. It's working out really well. Thank you for writing the software and sharing it with the community.

The contact form breaks regularly for reasons unrelated to honey. I am developing automation using python bs4 to detect when the form breaks.

Can honey be configured such that the presence of some header or cookie bypasses the spam protection such that the POST is successful for legit automation? I am currently getting an HTML error 419 when I attempt the post request. I suspect this related to honey doing its job but not sure.

Here's my code for reference.

   s = requests.Session()

    print(f"Performing GET on {URL}")
    response = s.get(URL)
    soup = BeautifulSoup(response.content, "html.parser")
    form = soup.find("contact-form")


    post_data = {
        "name": "Joe Blow",
        "phone": "3015554455",
        "email": "[email protected]",
        "message": "I am interested in your services.",
    }

    response = s.post(URL, data=post_data)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant