Description
Client raised issue with us, that when accessing the sites containing maps, they get access blocked due to phising alert. Upon investigation I found that the site fonts.openmaptiles.org has phising alert. This site is the source of fonts used by maps.
It seems that Plotly.py is referencing fonts.openmaptiles here: mimeExtension.js, so the true source of the problem is Plotly JS, not sure if i should maybe raise a ticket there instead?
Screenshots/Video
I cannot reproduce what my client experienced exactly, as I don't use the same security. But when accessing the font site I get the phising alert in the browser.
Steps to reproduce
Plotly.py version: plotly==6.6.0
How to know that my map references the compromised source?
- Go to a page with the Plotly map using chrome browser
- open the devtools in chrome, go to Network
- reload the page
- use search option to search for
openmaptiles
Notes
same issue reported in other libraries:
Since I thought that OpenStreetMap is a problem I tried other map styles, but the file is still showing.
Description
Client raised issue with us, that when accessing the sites containing maps, they get access blocked due to phising alert. Upon investigation I found that the site
fonts.openmaptiles.orghas phising alert. This site is the source of fonts used by maps.It seems that Plotly.py is referencing fonts.openmaptiles here: mimeExtension.js, so the true source of the problem is Plotly JS, not sure if i should maybe raise a ticket there instead?
Screenshots/Video
I cannot reproduce what my client experienced exactly, as I don't use the same security. But when accessing the font site I get the phising alert in the browser.
Steps to reproduce
Plotly.py version:
plotly==6.6.0How to know that my map references the compromised source?
openmaptilesNotes
same issue reported in other libraries:
Since I thought that OpenStreetMap is a problem I tried other map styles, but the file is still showing.