首页

Et Tu, Grammarly?

279 点作者 dbushell大约 2 个月前

14 条评论

preinheimer大约 2 个月前
My extension problem story is a bit different. We distribute an extension that makes it easy to switch between proxy servers for geolocation testing.<p>I ran my worst client demo ever a few months ago. It was like our product simply didn’t work. A lot of pulled hair and frustrating debugging later we discovered that a recent update to the 1Password extension broke ours. They were subscribing to an auth event, but not returning, this timed out so our subscriber was never called. So our extension would tell the browser to change proxy servers, then sit ready to provide credentials, but the request would never come. 1Password’s support team was better than grammerly’s, but it’s hard to convince an unknown PM to prioritize something, especially if you’re speaking to them via a support team.<p>We’ve since discovered that there’s some Russian extension you need for government websites that has the same issue.
评论 #43516584 未加载
karaterobot大约 2 个月前
If you&#x27;re injecting scripts or styles into unknown pages, the least you can do is namespace your variables.
评论 #43516740 未加载
评论 #43516604 未加载
评论 #43517036 未加载
评论 #43516957 未加载
jFriedensreich大约 2 个月前
Its frightening to see how many screenshares and recordings contain that green infestation as default on every website, not just the obvious visual disturbance (am i the only one who thinks the green is ugly and clashes with most websites colors?) that does not seem to bother users but the privacy and obvious attack vectors that come with it. Chrome can enable extensions only when needed why does no one do this? Why is this not the default on every browser?
评论 #43517379 未加载
评论 #43516038 未加载
olevzhyn大约 2 个月前
Hey. I’m an engineer at Grammarly Extension. First of all, I’m really sorry that our extension broke the UX on dbushell.com and caused the author to spend time and effort figuring this out.<p>That was never intentional, and we are using various techniques to prevent this from happening. Unfortunately, that wasn’t enough. The article clearly shows that there’s room for improvement.<p>We temporarily added an exception for dbushell.com as a quick fix. In the meantime, we’re working on a change to ensure proper style isolation; such issues must never be the case.<p>Thank you!
评论 #43520668 未加载
Aldipower大约 2 个月前
I&#x27;ve a similiar problem with Google Translate that breaks my web app. Users, using Google Translate, complaining my app is broken, but it was Google changing the state of my app from a higher meta level. Really bad practice..<p>I am trying to detect Google Translate and print a warning then.
评论 #43515029 未加载
评论 #43516979 未加载
kstrauser大约 2 个月前
I passed this along to the engineering team.
评论 #43517675 未加载
评论 #43516920 未加载
emptysea大约 2 个月前
At work we have a lot of sentry errors related to browser extensions doing weird stuff.<p>Chrome’s Google translate is also notorious for breaking react based sites.<p>It ends up being a tedious triage process to ignore each new extension issue. We use the client side filtering to reduce our ingest volume. In general we have to have a lot higher thresholds to handle the noise vs our backends.
评论 #43516871 未加载
评论 #43516812 未加载
lelandfe大约 2 个月前
I wonder what one variable could be injected to most break the web. I’m feeling:<p><pre><code> --primary-color: transparent</code></pre>
评论 #43525267 未加载
dbushell大约 2 个月前
How do you deal with hostile browser extensions?
评论 #43516486 未加载
评论 #43515016 未加载
评论 #43515058 未加载
评论 #43516270 未加载
评论 #43514670 未加载
MartijnHols大约 2 个月前
Makes me wonder if you can use this to hijack their plugin. At the very least you should be able to inject text into it, but you can probably render a pretty little login form as well, abusing the trust the user has in their extension. Is injecting elements into a document controlled by others really safe?
评论 #43517113 未加载
nikolay大约 2 个月前
I am happy with Microsoft&#x27;s free grammar checker extension - Microsoft Editor [0], which supports foreign languages as well... although I still pay for Grammarly. Microsoft&#x27;s works more smoothly and on more sites, including Hacker New!<p>[0]: <a href="https:&#x2F;&#x2F;chromewebstore.google.com&#x2F;detail&#x2F;microsoft-editor-spelling&#x2F;gpaiobkfhnonedkhhfjpmhdalgeoebfa" rel="nofollow">https:&#x2F;&#x2F;chromewebstore.google.com&#x2F;detail&#x2F;microsoft-editor-sp...</a>
jgalt212大约 2 个月前
<p><pre><code> - Access your data for all websites - Display notifications to you - Access browser tabs </code></pre> &gt; They could also, you know, not inject their code into every web page ever, unless the extension is actually used?<p>I guess we know why Grammarly never has any problems raising more funding.
vhantz大约 2 个月前
Do you know how they managed to inject stylesheets into every page bypassing CSP?
评论 #43516320 未加载
评论 #43516388 未加载
评论 #43516075 未加载
regularjack大约 2 个月前
Et toi
评论 #43516447 未加载
评论 #43516472 未加载