Safeguards against "token stealing" #2440
Replies: 3 comments 1 reply
-
You cannot make the script less privileged than the vanilla script. What would be nice to have is a version of the script install/update screen for users unable to read the code, which is the majority: basically display the same info as in the metadata block, but nicely formatted and with some explanation info. |
Beta Was this translation helpful? Give feedback.
-
JavaScript and UserScripts can't read HttpOnly cookies, which are often used as login cookie, but How do they retrieve the login token?
In order to send data via GM_xmlhttpRequest to another server scripts have to add a |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
A common type of malware on Greasy Fork is that which takes some private aspect of the current page, like the value of a cookie or something in the DOM and sends it to a third party server. This is commonly used to steal login tokens for Discord servers, but some scripts do it for legitimate reasons as well.
I am considering putting some sort of restriction or warning like as used for
@antifeature
, like "This script is sending your private info to another server, we can't tell if it'll use it for good or harm". But like@antifeature
, this is something that the script author would need to specify rather than something that could be detected automatically.I'm wondering what restrictions Tampermonkey has or could have that would stop this kind of malware, or at least make the general technique detectable, like
Beta Was this translation helpful? Give feedback.
All reactions