At Conrad Research we LOVE Temporal. It gives us a high velocity in development because our code doesn’t have to worry as much about implementing retry logic. We also are heavy users of Cloudflare workers. The combination of these two is awesome, but not straightforward. Let’s dig in:
I recently was reviewing the error logs on a Cloudflare Worker that had only been active for a week and was surprised to see the extent of attacks occurring that were sniffing for leaked credentials. Let’s take a look at some of the URLs that were being accessed.
Using HTMX and Cloudflare Workers is a great way to sprinkle in some dynamic functionality into your Cloudflare Pages static site. Let’s look at an example of handling a form submission.
Wait! What? Securing a static site? Yup, even if your site only contains static content, it doesn’t mean you’re safe from vulnerabilities like Cross-Site Scripting (XSS) and others. This becomes an even bigger issue if you’ve added forms or other interactive elements. The good news is that securing your site is straightforward.