mirror of
https://github.com/CHOMPStation2/CHOMPStation2.git
synced 2025-12-11 18:53:06 +00:00
We do not use python or nodejs scripts. Our discord bot makes HTTP requests. Therefore we can entirely disable this code. Even if we ever want to start using these procs for discord integration, we would pipe it through our HTTP discord proxy, not use shell(). With all instances of shell() disabled, we can't be attacked by it.
41 lines
1.3 KiB
Plaintext
41 lines
1.3 KiB
Plaintext
/proc/send2irc(var/channel, var/msg)
|
|
return // VOREStation Edit - Can't exploit shell if we never call shell!
|
|
if (config.use_irc_bot)
|
|
if (config.use_node_bot)
|
|
shell("node bridge.js -h \"[config.irc_bot_host]\" -p \"[config.irc_bot_port]\" -c \"[channel]\" -m \"[msg]\"")
|
|
else
|
|
if (config.irc_bot_host)
|
|
if(config.irc_bot_export)
|
|
spawn(-1) // spawn here prevents hanging in the case that the bot isn't reachable
|
|
world.Export("http://[config.irc_bot_host]:45678?[list2params(list(pwd=config.comms_password, chan=channel, mesg=msg))]")
|
|
else
|
|
if(config.use_lib_nudge)
|
|
var/nudge_lib
|
|
if(world.system_type == MS_WINDOWS)
|
|
nudge_lib = "lib\\nudge.dll"
|
|
else
|
|
nudge_lib = "lib/nudge.so"
|
|
|
|
spawn(0)
|
|
call(nudge_lib, "nudge")("[config.comms_password]","[config.irc_bot_host]","[channel]","[msg]")
|
|
else
|
|
spawn(0)
|
|
ext_python("ircbot_message.py", "[config.comms_password] [config.irc_bot_host] [channel] [msg]")
|
|
return
|
|
|
|
/proc/send2mainirc(var/msg)
|
|
if(config.main_irc)
|
|
send2irc(config.main_irc, msg)
|
|
return
|
|
|
|
/proc/send2adminirc(var/msg)
|
|
if(config.admin_irc)
|
|
send2irc(config.admin_irc, msg)
|
|
return
|
|
|
|
|
|
/hook/startup/proc/ircNotify()
|
|
send2mainirc("Server starting up on byond://[config.serverurl ? config.serverurl : (config.server ? config.server : "[world.address]:[world.port]")]")
|
|
return 1
|
|
|