Skip to content

amazon-adsystem.com URL in script #18

Closed Answered by Xmader
arm32x asked this question in Q&A
Discussion options

You must be logged in to vote

The musescore.com website monkey-patches the Image constructor to detect our downloader script by retrieving the error stacks,
see sealsrock12's answer.

Setting a sourcemap URL overrides the caller script name in error stacks.
(The script name would be something like chrome-extension://xxx/userscript.html?name=musescore-downloader.user.js on Chrome Tampermonkey, and it's very easy to detect)

I picked this specific one because it was the only script on the website legitimately using the Image constructor.
(musescore.com loads https://c.amazon-adsystem.com/aax2/apstag.js to display (Amazon) ads on their website.)


The stackChunks.every(function (chunk) { return chunk.indexOf('a (https://c.a…

Replies: 2 comments

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
0 replies
Answer selected by Xmader
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
question Further information is requested
3 participants