You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The devs for my company's website employ honeypot to protect against contact form span. It's working out really well. Thank you for writing the software and sharing it with the community.
The contact form breaks regularly for reasons unrelated to honey. I am developing automation using python bs4 to detect when the form breaks.
Can honey be configured such that the presence of some header or cookie bypasses the spam protection such that the POST is successful for legit automation? I am currently getting an HTML error 419 when I attempt the post request. I suspect this related to honey doing its job but not sure.
Here's my code for reference.
s = requests.Session()
print(f"Performing GET on {URL}")
response = s.get(URL)
soup = BeautifulSoup(response.content, "html.parser")
form = soup.find("contact-form")
post_data = {
"name": "Joe Blow",
"phone": "3015554455",
"email": "[email protected]",
"message": "I am interested in your services.",
}
response = s.post(URL, data=post_data)
The text was updated successfully, but these errors were encountered:
The devs for my company's website employ honeypot to protect against contact form span. It's working out really well. Thank you for writing the software and sharing it with the community.
The contact form breaks regularly for reasons unrelated to honey. I am developing automation using python bs4 to detect when the form breaks.
Can honey be configured such that the presence of some header or cookie bypasses the spam protection such that the POST is successful for legit automation? I am currently getting an HTML error 419 when I attempt the post request. I suspect this related to honey doing its job but not sure.
Here's my code for reference.
The text was updated successfully, but these errors were encountered: