InAppBrowser.com
InAppBrowser.com copied to clipboard
Showcasing what in-app browsers do under the hood
As far as I know iOS apps can inject code to be executed via `WKUserScript` as an alternative to `evaluateJavascript` and InAppBrowser.com cannot detect that since the injected code might...
To detect more things, elements should be added on the page so that conditional events that trigger potential further javascript injection can be triggered
First off, love the project – it is very much needed! I didn't see a way to open an issue nor contribution guidelines, I'm sure you're busy at the moment...
If the injected JS code is like the following: ``` alert('cookie: '+document.cookie); ``` This site is not able to detect it, and it will still shows green message. Cookie stealing...
If app injected codes like ```js var originGid = document.getElementById document.getElementById = id => { console.log('document.getElementById', id) return originGid(id) } ``` `InAppBrowser.com` will not be able to detect it unless...