Code Poets, HAIL! Need your gorgeous thoughts re using #JavaScript event listeners to flip content of an #HTML element for malicious exploits. Seems way too easy, with the copying and the pasting, oh my! Help reality check me, peas and carrots, thxu 🥕 😛bleepingcomputer.com/news/se…
3
3
3
Thanks Tina. The way the article read struck me as being illogical. It appears from you and others there's more than a few inaccuracies in the description of how an exploit can be passed via the clipboard API.
It's doable according to people weighing in but it's not accurately described in the article. What's more, the issue appears complicated by how the clipboard API can be tricky for some (like me) sho work adjacent to but not directly with JavaScript and a decrease w terminal use.
Point is, it's a perspective people who have GUIs upon GUIs and APIs upon APIs to run their workaday world appear, at least in my experience, are far more vulnerable due in part to obfuscation of core content and functions. I think! :)
Jan 7, 2022 · 4:08 PM UTC
