We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent eed9037 commit 9fa4d35Copy full SHA for 9fa4d35
.circleci/config.yml
README.md
@@ -5,8 +5,6 @@ Forgery on the request phase when using OmniAuth gem with a Ruby on Rails
5
application) by implementing a CSRF token verifier that directly uses
6
`ActionController::RequestForgeryProtection` code from Rails.
7
8
-[](https://circleci.com/gh/cookpad/omniauth-rails_csrf_protection/tree/main)
9
-
10
[CVE-2015-9284]: https://nvd.nist.gov/vuln/detail/CVE-2015-9284
11
12
## Usage
0 commit comments