Commit 4668575
fix: handle hex payloads whose first byte starts with 'A'
Previously, _extract_hex() would match _INSPECT_URL_RE and strip the
leading 'A', treating it as the classic asset-ID prefix marker. When the
XOR key byte encoded as hex 'A' (0xAx), this produced an odd-length hex
string which caused binascii.unhexlify() to raise an error.
Fix: add an even-length guard — if stripping 'A' yields an odd number of
hex characters, 'A' is part of the payload. Fall through to the
pure-masked regex which captures the full hex blob including the 'A'.1 parent b67ac21 commit 4668575
1 file changed
+6
-3
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
57 | 57 | | |
58 | 58 | | |
59 | 59 | | |
60 | | - | |
| 60 | + | |
| 61 | + | |
| 62 | + | |
61 | 63 | | |
62 | | - | |
| 64 | + | |
63 | 65 | | |
64 | 66 | | |
65 | | - | |
| 67 | + | |
| 68 | + | |
66 | 69 | | |
67 | 70 | | |
68 | 71 | | |
| |||
0 commit comments