Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

uBlock Origin lists trigger detection #6

Open
physkets opened this issue Apr 3, 2024 · 0 comments
Open

uBlock Origin lists trigger detection #6

physkets opened this issue Apr 3, 2024 · 0 comments

Comments

@physkets
Copy link

physkets commented Apr 3, 2024

The following block-lists used by an ad and malware blocking extension of a browser triggers detection:

~/.config/google-chrome/Default/Extensions/cjpalhdlnbpafiamejdnhcphjbkeiagm/1.56.0_0/assets/ublock/badware.min.txt: sigs.InterServer.net.HEX.Topline.blacklisted.domain.bingstyle.com.640.UNOFFICIAL FOUND
~/.config/google-chrome/Default/Extensions/cjpalhdlnbpafiamejdnhcphjbkeiagm/1.56.0_0/assets/thirdparties/easylist/easylist.txt: sigs.InterServer.net.HEX.Topline.malware.redirect.ecpms.net.720.UNOFFICIAL FOUND

Detecting just names of websites in files seems like false-positive.

Attached here are the files:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant