Hi-paste - execute pastebin code

hi-paste just executes pastebin code
ex. http://hi-paste.glitch.me/?paste=HSQ1vtML executes html code from pastebin.com/HSQ1vtML

NOTE: using this with a paste without viewing the code is as secure as going on a random site which could have malware

source code https://glitch.com/edit/#!/hi-paste?path=public%2Findex.php%3A91%3A0 (yes it really just does if string in HTML code then warn)

Error: If you tried to print & lt; in your code it would be shown in the source as < because pastebin put < as & lt; in the site so

4 Likes

This seems like a bad idea. Paste’s can be edited (without any notice), so if it seems good one day, it can have malicious code the next day.

1 Like

You can use https://www.virustotal.com/ and https://safeweb.norton.com/.

Yes because virustotal and safeweb can detect a IP logger (you can make your own in like <30 seconds)

1 Like

I made my own script on it, it alerts if anything is detected

Shoot, even using apache2 can be an IP logger by itself (if you know how check logs)

You could send your user a random page (such as example.com/hduhdfedfj) and then run: cat /var/log/apache2/access.log | grep /hduhdfedfj to get their IP.

(don’t actually do this, this is just to make a point)

1 Like

Ok, I just used an Open Source IP logger, and it didn’t detect anything.

lol all this for warnings against IP logging so now i would have to detect
-alert boxes
-prompts
-iframes
-external scripts (yes really)

i added it it detects alerts, prompts, external content (but gives false alarms sometimesall the time)


Code can be made hard to read/detect.
1 Like

Yep, this is why I proxy user images.

But I have to agree with @aboutdavid , running random code seems like a terrible idea. Maybe you should have a confirmation before users run the code?

There is a alert (alert()) which scans using virustotal, but, it only caught 1/10 of my test.

Also, using VirusTotal shares your code, which is something you may not want public.