- Sort Score
- Num 10 results
- Language All
Results 31 - 40 of 613 for script3 (0.08 seconds)
-
docs/fr/docs/_llm-test.md
# Fichier de test LLM { #llm-test-file } Ce document teste si le <abbr title="Large Language Model - Grand modèle de langage">LLM</abbr>, qui traduit la documentation, comprend le `general_prompt` dans `scripts/translate.py` et l’invite spécifique à la langue dans `docs/{language code}/llm-prompt.md`. L’invite spécifique à la langue est ajoutée à la fin de `general_prompt`. Les tests ajoutés ici seront visibles par tous les concepteurs d’invites spécifiques à chaque langue.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 12.8K bytes - Click Count (0) -
docs/es/docs/advanced/strict-content-type.md
Este comportamiento por defecto provee protección contra una clase de ataques de **Cross-Site Request Forgery (CSRF)** en un escenario muy específico. Estos ataques aprovechan que los navegadores permiten que los scripts envíen requests sin hacer un preflight de CORS cuando: * no tienen un header `Content-Type` (p. ej. usando `fetch()` con un body `Blob`) * y no envían credenciales de autenticación.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:12:26 GMT 2026 - 3.4K bytes - Click Count (0) -
docs/pt/docs/_llm-test.md
# Arquivo de teste de LLM { #llm-test-file } Este documento testa se o <abbr title="Large Language Model - Modelo de Linguagem de Grande Porte">LLM</abbr>, que traduz a documentação, entende o `general_prompt` em `scripts/translate.py` e o prompt específico do idioma em `docs/{language code}/llm-prompt.md`. O prompt específico do idioma é anexado ao `general_prompt`. Os testes adicionados aqui serão vistos por todos os designers dos prompts específicos de idioma.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:43 GMT 2026 - 12.1K bytes - Click Count (0) -
docs/en/docs/advanced/strict-content-type.md
## CSRF Risk { #csrf-risk } This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario. These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they: * don't have a `Content-Type` header (e.g. using `fetch()` with a `Blob` body) * and don't send any authentication credentials.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Mon Feb 23 17:45:20 GMT 2026 - 3.2K bytes - Click Count (0) -
docs/pt/docs/advanced/strict-content-type.md
Esse comportamento padrão oferece proteção contra uma classe de ataques de **Cross-Site Request Forgery (CSRF)** em um cenário muito específico. Esses ataques exploram o fato de que navegadores permitem que scripts enviem requisições sem fazer qualquer verificação de preflight de CORS quando: - não têm um cabeçalho `Content-Type` (por exemplo, usando `fetch()` com um corpo `Blob`) - e não enviam nenhuma credencial de autenticação.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:13 GMT 2026 - 3.5K bytes - Click Count (0) -
docs/en/docs/_llm-test.md
# LLM test file { #llm-test-file } This document tests if the <abbr title="Large Language Model">LLM</abbr>, which translates the documentation, understands the `general_prompt` in `scripts/translate.py` and the language specific prompt in `docs/{language code}/llm-prompt.md`. The language specific prompt is appended to `general_prompt`. Tests added here will be seen by all designers of language specific prompts. Use as follows:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 11K bytes - Click Count (0) -
docs/fr/docs/advanced/strict-content-type.md
Ce comportement par défaut offre une protection contre une catégorie d’attaques de Cross-Site Request Forgery (CSRF) dans un scénario très spécifique. Ces attaques exploitent le fait que les navigateurs permettent à des scripts d’envoyer des requêtes sans effectuer de pré-vérification CORS (preflight) lorsqu’ils : * n’ont pas d’en-tête `Content-Type` (par ex. en utilisant `fetch()` avec un corps `Blob`)
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:33:45 GMT 2026 - 3.9K bytes - Click Count (0) -
docs/tr/docs/virtual-environments.md
//// //// tab | Windows PowerShell <div class="termy"> ```console $ .venv\Scripts\Activate.ps1 ``` </div> //// //// tab | Windows Bash Ya da Windows'ta Bash kullanıyorsanız (örn. [Git Bash](https://gitforwindows.org/)): <div class="termy"> ```console $ source .venv/Scripts/activate ``` </div> //// /// tip | İpucu
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 23.5K bytes - Click Count (0) -
docs/de/docs/virtual-environments.md
//// //// tab | Windows PowerShell <div class="termy"> ```console $ .venv\Scripts\Activate.ps1 ``` </div> //// //// tab | Windows Bash Oder wenn Sie Bash für Windows verwenden (z. B. [Git Bash](https://gitforwindows.org/)): <div class="termy"> ```console $ source .venv/Scripts/activate ``` </div> //// /// tip | Tipp
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 24.8K bytes - Click Count (0) -
docs/en/docs/virtual-environments.md
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 22.1K bytes - Click Count (0)