question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Possible exploit: auto-clicking webapp

See original GitHub issue

There is a probability of edge case where Mastodon web application might be exploited by some instance admin (or fork by association) to automatically click “boost”, “favourite”, “follow”, etc., which can go undetected for enough time.

To recap, web application will be able to do malicious actions on behalf of the extension’s user (there is few that it can do, but still significant). Already seeing a potential for dispatchEvent there.

I don’t yet know how to warrant solid safety from this exploit, here are just some options I considered:

  • place a warning in extension’s menu;
  • make up a list of possible violators as a blacklist (which is not really an option, given the little age of window for exploit);
  • intercept such clicks, but somehow detect whether they were really done by hand (should find a way that can’t be reproduced by a script) - if action is not made by user interation, simply don’t mirror it to original instance.

Issue Analytics

  • State:closed
  • Created 9 months ago
  • Comments:7 (4 by maintainers)

github_iconTop GitHub Comments

2reactions
vintproxcommented, Dec 16, 2022

Found out that Event.isTrusted is one reliable way to check for genuine user click/press.

Even redefining custom event interface with faked isTrusted = true won’t pass the error like Uncaught TypeError: can't redefine non-configurable property "isTrusted".

Doing a PR now 😊👍

0reactions
vintproxcommented, Dec 19, 2022

Ah, OK, I was very busy lately anyway, so I appreciate you taking it over, @Lartsch. Good stuff!

Read more comments on GitHub >

github_iconTop Results From Across the Web

Issues · Lartsch/FediAct - GitHub
Possible exploit : auto-clicking webapp enhancement New feature or request help wanted Extra attention is needed Looking into it.
Read more >
Tekya auto-clicker malware exploits kids' Android apps
Google has removed multiple apps for children that were found to contain Tekya auto-clicker malware.
Read more >
Can a website tell if I'm using an auto clicker (program ... - Quora
In theory, no, it should not be possible for a Web page, by itself, ... Usually such findings can be published in a...
Read more >
Is using an Autoclicker cheating? discussion on Kongregate ...
This isn't a multiplayer game, so you can do what you want, but that doesn't mean it isn't a cheat. > > >...
Read more >
RELLsin @RELLGames on Twitter: "Autofarm = exploit farm ...
4:09 AM · Oct 1, 2020 ·Twitter Web App ... Wait so auto clicking allowed??? ... Most likely I doubt they mean autoclickers...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found