<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Script Gadgets! Google Docs XSS Vulnerability Walkthrough</title>
        <link>https://stream.echo6.co/videos/watch/13c502c2-25db-468e-be32-c8370e2061a9</link>
        <description>A very interesting Cross-site Scripting Issue in gDocs Spreadsheets. I get a chance to talk to the bug hunter Nick, as well as Google engineers to understand both sides. How did he find it? And why did this vulnerability exist in the first place? Nickolay: https://thisisqa.com/ The video is sponsored by Google's VRP: https://www.google.com/about/appsecurity/reward-program/ 00:00 - Introduction 00:53 - Following reproduction steps 02:13 - What is postMessage()? 03:04 - Script Gadget: the hlc() function 03:30 - Script Gadget: ui.type instantiation 04:22 - Vulnerability summary 05:12 - Nick's focus on gviz 06:47 - Script Gadget: chartType injection 08:09 - Script Gadget: drawFromUrl exploit technique 08:57 - chartType injection fix 10:13 - Code refactoring cause of XSS 11:12 - How to find ui.type option? 14:04 - What to do with ui.type Script Gadgets? 15:13 - Why does hlc() exist?! 15:40 - JSONP sandbox 17:16 - Nick's background story =[ ❤️ Support ]= → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join =[ 🐕 Social ]= → Twitter: https://twitter.com/LiveOverflow/ → Website: https://liveoverflow.com/ → Subreddit: https://www.reddit.com/r/LiveOverflow/ → Facebook: https://www.facebook.com/LiveOverflow/</description>
        <lastBuildDate>Wed, 15 Apr 2026 09:59:50 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>Script Gadgets! Google Docs XSS Vulnerability Walkthrough</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/13c502c2-25db-468e-be32-c8370e2061a9</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=13c502c2-25db-468e-be32-c8370e2061a9" rel="self" type="application/rss+xml"/>
    </channel>
</rss>