Skip to content
This repository has been archived by the owner on May 29, 2023. It is now read-only.

Exploring ways to attack an Elm app in a compromised JS environment

License

Notifications You must be signed in to change notification settings

mfeineis/kata-elm-attack-vectors

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

kata-elm-attack-vectors

Exploring ways to attack an Elm 0.19.0 app in a compromised JS environment

What do I do?

  • Install NodeJS
  • Run yarn install && yarn build && yarn start, npm will work too
  • Visit the served page in the browser of your choice at http://localhost:5000
  • You'll be presented with the scenarios compromising the sample app located in src/App.elm

Potential other ways?

  • Proxy
  • Json.Decode.Value with side-effects
  • webworker
  • Monkey patch XMLHttpRequest etc.
  • localStorage

About

Exploring ways to attack an Elm app in a compromised JS environment

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published