Closed dimerman closed 4 years ago
There's no information in the report so it's not a bug. A screen shot of a devtools panel does not tell us the version of Sizzle, where the script came from, what code it was called from, or other important things. You can put a breakpoint on the call to determine more.
Turns out the chrome extension "Ultra Ad Block" was responsible for this. I see the version of sizzle used is not even supported. My concern was a malicious pull request that would have compromised the library. cheers.
While developing I caught this fragment of network traffic. I couldn't find any information about the host
massehight.com
but looks like it's publishing metrics of some sort. I had a brief look at sizzle's code but couldn't find any reference to this. Am I misreading things?