←back to thread

Et Tu, Grammarly?

(dbushell.com)
279 points dbushell | 3 comments | | HN request time: 1.041s | source
Show context
MartijnHols ◴[] No.43516805[source]
Makes me wonder if you can use this to hijack their plugin. At the very least you should be able to inject text into it, but you can probably render a pretty little login form as well, abusing the trust the user has in their extension. Is injecting elements into a document controlled by others really safe?
replies(1): >>43517113 #
1. echoangle ◴[] No.43517113[source]
How would this work? They are injecting CSS into your page, but you can't inject anything into the extension UI from a website. The only thing you could do would be to emulate the extension UI in your website, but for that you don't need to inject anything. You can just copy the design.
replies(1): >>43517231 #
2. MartijnHols ◴[] No.43517231[source]
The article mentions they inject a web component. I imagine a bad actor could add something to that. In this case at the very least the author could add a "I hacked your Grammarly extension" text just via CSS, but I'm sure you can go much further, even more so with other extensions (eg password managers).
replies(1): >>43517383 #
3. echoangle ◴[] No.43517383[source]
But you could also just add you own lookalike web component to you page that looks like the grammarly one. If people enter credentials there, it's user error.