← Home Loading…

Deep coverage of novel and obscure egress/exfil channels not covered by other suites. This suite targets channels that are frequently missed by WebView URL filters: DNS-over-HTTPS tunnelling, CSS Houdini worklet loads, XSLT external document(), import map URL overrides, javascript: URI execution, alternative-origin blob/data iframe escapes, URL parser confusion attacks, device APIs (USB/BT/Serial/NFC), Web Share, Clipboard, Reporting, and timing/cache side-channel oracles (reconnaissance-without-request attacks).

Two classes of threat: (1) Exfil — data leaves the process to an external endpoint. (2) Covert/oracle — the page learns information about the filter's allow list without making a "blocked" outbound request.
TestMethodTargetResult