[Webkit-unassigned] [Bug 194358] New: Web Inspector:
bugzilla-daemon at webkit.org
bugzilla-daemon at webkit.org
Wed Feb 6 13:30:11 PST 2019
https://bugs.webkit.org/show_bug.cgi?id=194358
Bug ID: 194358
Summary: Web Inspector:
Product: WebKit
Version: WebKit Nightly Build
Hardware: All
OS: All
Status: NEW
Severity: Enhancement
Priority: P2
Component: Web Inspector
Assignee: webkit-unassigned at lists.webkit.org
Reporter: seth at freaksw.com
CC: inspector-bugzilla-changes at group.apple.com
On a couple of websites recently I've been noticing full page redirects to some Flash Player phishing junk. I'm trying to figure out what resource/javascript/etc is actually causing this redirect, but I can't figure it out. In the inspector's Network tab I have Preserve Log turned on, and I can see where this phishing page gets loaded, but I can't figure out what *caused* it to load.
It would be useful to know what resource and line within it (Javascript, html, css, etc) caused a resource/document to be loaded so this could be tracked.
--
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20190206/0348cf71/attachment-0001.html>
More information about the webkit-unassigned
mailing list