Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

What's the trivial solution to this? I also wound up hosting the malicious file on my personal server...


data-uris also work: #data:text/javascript,alert('pwn')


That's what I used too. Hosting scripts is far too much like hard work...


There are apparently easier ways, but I just chucked an alert(); in my Dropbox public folder, did an //dl.dropboxusercontent.com/u/14XXX/xss.js as they serve both http and https.


I put a small gist up and hotlinked through githack.com




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: