re-enable /co i for ops

  • Co was blocked due to a vulnerability that was raised, and as we are no longer in a position to easily or want to maintain a custom fork of CoreProtect, I think we will now likely block /co for OP's going forward unfortunately, as maintaining a fork of CoreProtect just for the sake of enabling this is not really a sustainable option imho

    Wild1145

    Network Owner at TotalFreedom

    Managing Director at ATLAS Media Group Ltd.

    Founder & Owner at MastodonApp.UK

  • @StevenNL2000#1783 yeah I'm inclined to agree. When I get home I'll take a look as it would be my preferred way forward if we allow non admins to use Co inspect

    Wild1145

    Network Owner at TotalFreedom

    Managing Director at ATLAS Media Group Ltd.

    Founder & Owner at MastodonApp.UK

  • @StevenNL2000#1783 @wild1145#1790 According to Telesphoreo there is no API functionality on behalf of CoreProtect for toggling the inspector and IntelliJ has personally declined (to him) the possibility of it being added.

  • So we won't re-enable the native core protect commands, because it will require us to try to maintain a custom variant of core protect, which is not something we want to do.


    Given CoreProtect does have an API and we're storing in MySQL anyway, I will approve this suggestion but only if we implement this functionality as part of TFM and are not using the native /co command.


    I will also ask that we have a cool down on the command / interface which should be able to be configured as part of config, as I believe the fact /co I doesn't have a cool down / queue logic seemed to be what caused us issues at the start.

    Wild1145

    Network Owner at TotalFreedom

    Managing Director at ATLAS Media Group Ltd.

    Founder & Owner at MastodonApp.UK

  • @SuperRyn#1959 Because you can't see people doing it... You're not spamming commands, you're spamming queries using /co i

    Wild1145

    Network Owner at TotalFreedom

    Managing Director at ATLAS Media Group Ltd.

    Founder & Owner at MastodonApp.UK

  • FS-14 raised to implement the custom command as previously described.

    Wild1145

    Network Owner at TotalFreedom

    Managing Director at ATLAS Media Group Ltd.

    Founder & Owner at MastodonApp.UK

  • To update there is now an /inspect command (I think is what it was called) which will allow OP's (And admins) to inspect blocks using CoreProtect without exposing the issue we originally had.

    Wild1145

    Network Owner at TotalFreedom

    Managing Director at ATLAS Media Group Ltd.

    Founder & Owner at MastodonApp.UK

Participate now!

Don’t have an account yet? Register yourself now and be a part of our community!