From f54ea74c345b41df769e36cd03fc65177aa530cd Mon Sep 17 00:00:00 2001 From: Sean <11340230+seanfcarroll@users.noreply.github.com> Date: Sun, 15 Aug 2021 14:15:10 +0200 Subject: [PATCH] Add instructions on bypassing script protections --- README.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/README.md b/README.md index fa03a46..517eef4 100644 --- a/README.md +++ b/README.md @@ -11,6 +11,14 @@ Add this line to your Rails application's Gemfile (in most cases, for developmen gem 'heavens_door', group: :development ``` +Enable running of unsafe scripts via Application Controller + +```ruby +content_security_policy false +``` + +> Please not this code should _not_ be committed and be left in place only when generating test scripts in development mode. If this code is pushed to production it will open out your site to attacks. + ## Usage