Hacker News new | past | comments | ask | show | jobs | submit login

> Others on here have attempted examples, but they have all failed.

Where? I’m happy to prove the attack vector if necessary, would be trivial for me to do if the app is designed the way you described it (and no, not eligible for any Google bounty as this has nothing to do with same origin policy).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: