I deployed a PsiTransfer instance in Docker, the web address is http://192.168.0.x:21xxx. At the same time, http://192.168.0.x:5xxx is the address of Synology's web desktop. The browser uses Bitwarden is used to automatically fill in the password when logging in. But this caused a problem: Bitwarden found the text box with the element ID password in the PsiTransfer web page, and automatically filled the password here. The password here is used to log in http://192.168.0.x:5xxx, my password will be leaked a little accidentally.
Under the premise of refusing to give up the autofill password, the current temporary solution is: use Tampermonky to inject code into the PsiTransfer web page, the purpose is to modify the element ID of the extraction code text box to other, to avoid Bitwarden autofill.
I deployed a PsiTransfer instance in Docker, the web address is
http://192.168.0.x:21xxx
. At the same time,http://192.168.0.x:5xxx
is the address of Synology's web desktop. The browser uses Bitwarden is used to automatically fill in the password when logging in. But this caused a problem: Bitwarden found the text box with the element IDpassword
in the PsiTransfer web page, and automatically filled the password here. The password here is used to log inhttp://192.168.0.x:5xxx
, my password will be leaked a little accidentally.Under the premise of refusing to give up the autofill password, the current temporary solution is: use Tampermonky to inject code into the PsiTransfer web page, the purpose is to modify the element ID of the extraction code text box to other, to avoid Bitwarden autofill.