Made by Frans Rosén. Presented during the "Attacking modern web technologies"-talk (Slides) at OWASP AppSec Europe back in 2018, but finally released in May 2020. This Chrome extension monitors postMessage-listeners by showing you an indicator about the amount of listeners in the current window. It supports tracking listeners in all subframes of the window. It also keeps track of short-lived listeners and listeners enabled upon interactions. You can also log the listener functions and locations to look them through them at a later stage by using the Log URL-option in the extension. This enables you to find hidden listeners that are only enabled for a short time inside an iframe. It also shows you the interaction between windows inside the console and will specify the windows using a path you can use yourself to replay the message: It also supports tracking communication happening between different windows, using Supports Raven, New Relic, Rollbar, Bugsnag and jQuery wrappers and "unpacks" them to show you the real listener. Tries to bypass and reroute wrappers so the Devtools console will show the proper listeners: Using New Relic: After, with postMessage-tracker: Using jQuery: After, with postMessage-tracker: postMessage-tracker
diffwin
as sender or receiver in the console. Features
chrome://extensions
-page:bound
-string as the listener: Known issues
Since some websites could be served as XML with a XHTML-namespace, it will also attach itself to plain XML-files and will be rendered in the top of the XML. This might confuse you if you look at XML-files in the browser, as the complete injected script is in the DOM of the XML. I haven't found a way to hide it from real XML-files, but still support it for XHTML-namespaces. The content script is not added to the DOM if the document.contentType
is application/xml
which happens when Chrome renders XML-files.