| ▲ | LocalPCGuy 19 hours ago | |
If I can run my own code but in your context, I can pull in malicious scripts. With those (all these are "possible" but not always, as usual, it depends, and random off the top of my head): - I can redirect you to sites I control where I may be able to capture your login credentials. - May be able to prompt and get you to download malware or virus payloads and run them locally. - Can deface the site you are on, either leading to reputational harm for that brand, or leading you to think you're doing one thing when you're actually doing another. - I may be able to exfiltrate your cookies and auth tokens for that site and potentially act as you. - I might be able to pivot to other connected sites that use that site's authentication. - I can prompt, as the site, for escalated access, and you may grant it because you trust that site, thereby potentially gaining access to your machine (it's not that the browsers fully restrict local access, they just require permission). - Other social engineering attacks, trying to trick you into doing something that grants me more access, information, etc. | ||