[Webkit-unassigned] [Bug 194358] New: Web Inspector:

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Wed Feb 6 13:30:11 PST 2019


https://bugs.webkit.org/show_bug.cgi?id=194358

            Bug ID: 194358
           Summary: Web Inspector:
           Product: WebKit
           Version: WebKit Nightly Build
          Hardware: All
                OS: All
            Status: NEW
          Severity: Enhancement
          Priority: P2
         Component: Web Inspector
          Assignee: webkit-unassigned at lists.webkit.org
          Reporter: seth at freaksw.com
                CC: inspector-bugzilla-changes at group.apple.com

On a couple of websites recently I've been noticing full page redirects to some Flash Player phishing junk. I'm trying to figure out what resource/javascript/etc is actually causing this redirect, but I can't figure it out. In the inspector's Network tab I have Preserve Log turned on, and I can see where this phishing page gets loaded, but I can't figure out what *caused* it to load.

It would be useful to know what resource and line within it (Javascript, html, css, etc) caused a resource/document to be loaded so this could be tracked.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20190206/0348cf71/attachment-0001.html>


More information about the webkit-unassigned mailing list