Today I learned that if you’re able to trigger a XSS vulnerability on a website through javascript code injection in the request payload, you can use a trick to find the source of this using the console.trace(1)
code injection. If the trigger happens, the exact code trace of the trigger event will be logged to the browser console.
This helped me save some debugging time today. If you know of any other way, hit me up and let me know :)
This trick could help programmers gain back a ton of time in dev-loops. Hope you found this helpful!
π βΈ» @TnvMadhav