_ _ _ _ _ _ _ | \| (_)__| |_ ___| |__ _ ___ _ | |___| |_ _ _ ___ ___ _ _ | .` | / _| ' \/ _ \ / _` (_-< | || / _ \ ' \| ' \(_-</ _ \ ' \ |_|\_|_\__|_||_\___/_\__,_/__/ \__/\___/_||_|_||_/__/\___/_||_|
📆 July 4, 2023 | ⏱️ 1 minute read | 🏷️ computing
People in advertising[1], marketing, SEO[2], and other bullshit industries have littered the web with phrases that sound significant but don't actually communicate anything.
A while back I discovered this amusing JavaScript program called bullshit.js[3] which you can run in the browser to replace some of that marketing BS with the word "bullshit".
The official bullshit.js webpage includes a bookmark link which is vulnerable to xss[4]. Here's my patched version:
javascript:(function(){var d=document,s=d.createElement('script');s.crossOrigin='anonymous';s.integrity='sha256-J3uYBSO4XnmUCTfYH458SPL2Cp+wlPOnt64DreZjAtw=';s.src='https://unpkg.com/@mourner/bullshit@1.2.0/bullshit.js';d.body.appendChild(s);}())
Enjoy.
🔗 4: Cross Site Scripting Attack
Copyright 2019-2023 Nicholas Johnson. CC BY-SA 4.0.