Help get this topic noticed by sharing it on Twitter, Facebook, or email.

False positive with qooxdoo JavaScript framework

A false positive is triggered by qooxdoo JavaScript framework (http://qooxdoo.org).

A qooxdoo desktop application, when built for debugging, pulls framework sources from server file by file. Ghostery erroneously blocks the file MBoxShadow.js, thus breaking the whole framework and rendering application unusable. The file is falsely recognized as "Adobe Test & Target" beacon by regex:

"2770": "\\/mbox(.*)?\\.js"

While it's pretty easy to manually unblock this particular bug, it takes hours to find the culprit.

See also:

http://qooxdoo.678.n2.nabble.com/Buil...
1 person has
this problem
+1
Reply