Check if an in-app browser is injecting JavaScript code
Some iOS and Android apps make use of a custom in-app browser (full details). This causes potential security and privacy risks to the user.
✅ This tool couldn't detect any JavaScript injections. However, this doesn't mean there were no code injections. As of iOS 14.3, Apple introduced a new way of running JavaScript code in an "Isolated World", making it impossible for a website to verify what code is being executed.
If you opened this website in iOS Safari, or it's being rendered by SFSafariViewController, you are on the safe side when it comes to injecting JavaScript code.
Please read the Disclaimer below, as well as the full explanation
🕵️♂️ Javascript injection detected. This does not necessarily imply malicious behaviour.
However, this doesn't mean there were no other code injections. As of iOS 14.3, Apple introduced a new way of running JavaScript code in an "Isolated World", making it impossible for a website to verify what code is being executed.Please read the Disclaimer below, as well as the full explanation
🚨 JavaScript injection detected, with some potentially dangerous commands.
There might be additional JavaScript commands executed using "Isolated World" JavaScript, which can't be detected on this page.
Please read the Disclaimer below, as well as the full explanation
✅ It looks like you're opening this page on a third party iOS/Android browser.
It doesn't really make sense to show the JavaScript commands executed, as the browser needs to run JavaScript commands to offer their features, like a password manager, the print dialog, search on page, and media management
This page will still show the commands detected by this page, however some mobile browsers already leverage the "Isolated World" JavaScript, which can't be detected by this page
Please read the Disclaimer below, as well as the full explanation
Please note that there aren't any meaningful conclusions on the output below for browser apps.
Disclaimer: This tool works by overriding the most common JavaScript functions, however the host app may still inject other commands. As of iOS 14.3, Apple introduced a new way of running JavaScript code in an "Isolated World", making it impossible for a website to verify what code is being executed. Also this tool cannot detect other app tracking that may occur, such as custom gesture recognition, screenshot detection, or tracking of web request events.
Important: Before jumping to any conclusions, please read this post.