URL: https://isaca.my.site.com Model: Joe Sandbox AI | {
"typosquatting": false,
"unusual_query_string": false,
"suspicious_tld": false,
"ip_in_url": false,
"long_subdomain": false,
"malicious_keywords": false,
"encoded_characters": false,
"redirection": false,
"contains_email_address": false,
"known_domain": true,
"brand_spoofing_attempt": false,
"third_party_hosting": true,
"reasoning": "This appears to be a legitimate ISACA subdomain hosted on Salesforce's site.com platform, which is a common third-party hosting solution for organizations. The structure follows the standard Salesforce community URL pattern."
} |
URL: https://isaca.my.site.com |
URL: https://isaca.my.site.com/ISACALogin/login... Model: Joe Sandbox AI | {
"risk_score": 4,
"reasoning": "The provided JavaScript snippet appears to be a wrapper around the native DOM APIs, potentially for the purpose of monitoring or intercepting DOM interactions. While this behavior is not inherently malicious, it could be used for malicious purposes if the intercepted data is sent to untrusted domains or used for unauthorized activities. The snippet does not demonstrate any high-risk indicators, but the potential for abuse warrants further review and monitoring."
} |
!function(){const e={documentCreateElement:Document.prototype.createElement,elementSetAttribute:Element.prototype.setAttribute,elementAttachShadow:Element.prototype.attachShadow,elementAppendChild:Element.prototype.appendChild,htmlelementAddEventListener:Element.prototype.addEventListener,iframeContentDocumentGet:Object.getOwnPropertyDescriptor(HTMLIFrameElement.prototype,"contentDocument").get,iframeContentWindowGet:Object.getOwnPropertyDescriptor(HTMLIFrameElement.prototype,"contentWindow").get};Object.freeze(e),Object.defineProperty(window,"originalDomApis",{writable:!1,value:e});const t=window.frames;Object.defineProperty(window,"frames",{get:function(){const e=[];for(let n=0;n<t.length;n++)try{t[n].frameElement.getRootNode().nodeType===Node.DOCUMENT_FRAGMENT_NODE||e.push(t[n])}catch(o){e.push(t[n])}return e.length===t.length?t:e}})}();
|
URL: https://isaca.my.site.com/ISACALogin/login... Model: Joe Sandbox AI | {
"risk_score": 4,
"reasoning": "The script has a few moderate-risk indicators, such as external data transmission to third-party domains and aggressive DOM manipulation. However, it appears to be primarily focused on handling browser support and error scenarios, which is a legitimate use case. The script does not demonstrate any clear malicious intent, but it could benefit from improved transparency and security practices."
} |
function launchModal(_ref){var id=_ref.id,titleLabel=_ref.titleLabel,contentLabel=_ref.contentLabel,buttonLabel=_ref.buttonLabel,callback=_ref.callback;var modalTemplate="<div id=\"".concat(id,"\">\n <section\n role=\"alertdialog\"\n tabindex=\"-1\"\n aria-labelledby=\"prompt-heading-id\"\n aria-describedby=\"prompt-message-wrapper\"\n class=\"slds-modal slds-fade-in-open slds-modal_prompt\"\n aria-modal=\"true\"\n style=\"color: rgb(62, 62, 60)\"\n >\n <div class=\"slds-modal__container\">\n <header class=\"slds-modal__header slds-theme_info slds-theme_alert-texture\">\n <h2 class=\"slds-text-heading_medium\">").concat(titleLabel,"</h2>\n </header>\n <div class=\"slds-modal__content slds-p-around_medium\">\n <p id=\"prompt-message-id\">").concat(contentLabel,"</p>\n </div>\n <footer class=\"slds-modal__footer slds-theme_default\">\n <button class=\"slds-button slds-button_neutral js-button\">").concat(buttonLabel,"</button>\n </footer>\n </div>\n </section>\n <div class=\"slds-backdrop slds-backdrop_open\"></div>\n </div>");var div=document.createElement("div");div.innerHTML=modalTemplate;div.querySelector(".js-button").addEventListener("click",callback);if(!document.body){document.createElement("body")}document.body.appendChild(div.querySelector("#".concat(id)))}window.onload=function(){if(!window.isBrowserSupportedByWebruntime){var WEBRUNTIME_UNSUPPORTED_BROWSER_MODAL_ID="webruntime-browser-not-supported-message";launchModal({id:WEBRUNTIME_UNSUPPORTED_BROWSER_MODAL_ID,titleLabel:"Your browser isn't supported",contentLabel:"Your browser doesn\u2019t support some features on this site. For the best experience, update your browser to the latest version, or switch to another browser.",buttonLabel:"Got It",callback:function callback(){var modal=document.querySelector("#".concat(WEBRUNTIME_UNSUPPORTED_BROWSER_MODAL_ID));document.body.removeChild(modal)}})}};window.document.addEventListener("client-error",function(error){if(error.detail.type==="FAILED_TO_LOAD_RESOURCE"){launchModal({id:"webruntime-client-error-failed-to-load-resource",titleLabel:"Oops!",contentLabel:"Something went wrong. Please try refreshing the app",buttonLabel:"Refresh",callback:function callback(){var url=new URL(window.location);url.searchParams.set("lwr.cachebust",new Date().getTime());window.location=url.href}})}else if(error.detail.type==="TOO_MANY_REQUESTS"){window.document.cookie="TooManyRequests=true;max-age=30;";window.location.reload()}});
|
URL: https://isaca.my.site.com/ISACALogin/webruntime/fr... Model: Joe Sandbox AI | {
"risk_score": 2,
"reasoning": "The provided JavaScript snippet appears to be a module loader shim for a web application framework called LWR (Lightweight Renderer). It does not contain any high-risk indicators like dynamic code execution, data exfiltration, or obfuscated code. The script is primarily focused on initializing the application, managing the module loading process, and providing profiling capabilities. While it uses some legacy APIs like `XDomainRequest`, these pose minor risks and are not inherently malicious. Overall, the script seems to be a legitimate part of the LWR framework and does not exhibit suspicious behavior."
} |
/**
* Copyright (c) 2021, salesforce.com, inc.
* All rights reserved.
* SPDX-License-Identifier: MIT
* For full license text, see the LICENSE file in the repo root or https://opensource.org/licenses/MIT
*/
/* LWR Legacy Module Loader Shim v0.13.10 */
!function(){"use strict";var e=function(e){return e[e.Start=0]="Start",e[e.End=1]="End",e}(e||{});let t;function r(e){t=e}const o=globalThis.performance,s=void 0!==o&&"function"==typeof o.mark&&"function"==typeof o.clearMarks&&"function"==typeof o.measure&&"function"==typeof o.clearMeasures;function n(e,t){return t?`${e}-${t}`:e}function i(e,t,r){const o=n(e,t);return t&&r?`${o}_${r}`:o}function a(e,t){const r=e||t?{...t}:null;return r&&e&&(r.specifier=e),r}function l({id:r,specifier:n,specifierIndex:l,metadata:d}){if(t)t({id:r,phase:e.Start,specifier:n,metadata:d});else if(s){const e=i(r,n,l),t=a(n,d);o.mark(e,{detail:t})}}function d({id:r,specifier:l,specifierIndex:d,metadata:c}){if(t)t({id:r,phase:e.End,specifier:l,metadata:c});else if(s){const e=i(r,l,d),t=n(r,l),s=a(l,c);o.measure(t,{start:e,detail:s}),o.clearMarks(e),o.clearMeasures(t)}}function c(e,t,o,s){const{autoBoot:n,customInit:i}=e;if(function(e,t){if(!e&&!t)throw new Error("The customInit hook is required when autoBoot is false");if(e&&t)throw new Error("The customInit hook must not be defined when autoBoot is true")}(n,i),i){i({initializeApp:t,define:o,onBootstrapError:s,attachDispatcher:r},e)}}const u="function"==typeof setTimeout,p="undefined"!=typeof console;class f{__init(){this.defineCache={}}__init2(){this.orderedDefs=[]}constructor(e){f.prototype.__init.call(this),f.prototype.__init2.call(this),u&&(this.watchdogTimerId=this.startWatchdogTimer()),this.global=e,this.config=e.LWR,this.loaderModule="lwr/loaderLegacy/v/0_13_10",this.errorHandler=this.config.onError;const t=this.tempDefine.bind(this);e.LWR.define=t,this.bootReady=this.config.autoBoot;try{this.createProfilerModule(e.LWR.define),c(Object.freeze(this.config),this.postCustomInit.bind(this),t,(e=>{this.errorHandler=e}))}catch(e){this.enterErrorState(e)}}canInit(){if(!this.config.requiredModules)throw new Error("Unexpected missing requiredModules");const e=this.config.requiredModules.every((e=>this.orderedDefs.includes(e)));return this.bootReady&&e}tempDefine(...e){const t=e[0];this.defineCache[t]=e,this.orderedDefs.push(t),this.canInit()&&(u&&clearTimeout(this.watchdogTimerId),this.initApp())}postCustomInit(){this.bootReady=!0,this.canInit()&&(u&&clearTimeout(this.watchdogTimerId),this.initApp())}initApp(){try{const e={baseUrl:this.config.baseUrl,profiler:{logOperationStart:l,logOperationEnd:d},appMetadata:{appId:this.config.appId,bootstrapModule:this.config.bootstrapModule,rootComponent:this.config.rootComponent,rootComponents:this.config.rootComponents}},t=function(e,t,r,o){if(!t||"function"!=typeof t[2])throw new Error(`Expected loader with specifier "${e}" to be a module`);const s={};t[2].call(null,s);const{Loader:n}=s;if(!n)throw new Error("Expected Loader class to be defined");const i=new n(r);return o&&o.length&&i.registerExternalModules(o),i.define(e,["exports"],(e=>{Object.assign(e,{define:i.define.bind(i),load:i.load.bind(i),services:i.services,clearRegistry:i.clearRegistry.bind(i)})}),t[3]),i}(this.loaderModule,this.defineCache[this.loaderModule],e,this.config.preloadModules);this.mountApp(t)}catch(e){this.enterErrorState(e)}}waitForDOMContentLoaded(){return void 0===typeof document||"interactive"===document.readyState||"complete"===document.readyState?Promise.resolve():new Promise((e=>{document.addEventListener("DOMContentLoaded",(()=>{e()}))}))}createProfilerModule(e){e("lwr/profiler/v/0_13_10",["exports"],(e=>{Object.assign(e,{logOperationStart:l,logOperationEnd:d})}),{})}mountApp(e){const{bootstrapModule:t,rootComponent:r,importMappings:o,rootComponents:s,serverData:n,endpoints:i}=this.config;this.global.LWR=Object.freeze({define:e.define.bind(e),rootComponent:r,rootComponents:s,serverData:n||{},importMappings:o,endpoints:i,env:this.global.LW |
URL: https://isaca.my.site.com/ISACALogin/login... Model: Joe Sandbox AI | {
"risk_score": 3,
"reasoning": "The provided JavaScript snippet appears to be a configuration object for a web application framework, with no obvious high-risk behaviors. It sets up the necessary modules, import mappings, and root components for the application. While it uses some external domains and APIs, the context suggests this is likely for legitimate purposes such as analytics and user management. The script does not contain any indicators of dynamic code execution, data exfiltration, or other malicious activities, so it is assessed as a low-risk script."
} |
globalThis.LWR = globalThis.LWR || {};
Object.assign(globalThis.LWR, {
"bootstrapModule": "@lwrjs/app-service/communities_app/module/amd/v/0_13_10",
"autoBoot": false,
"rootComponents": [
"webruntime/app/v/1"
],
"requiredModules": [
"lwc/v/7_1_5",
"@lwrjs/app-service/communities_app/module/amd/v/0_13_10"
],
"importMappings": {
"default": "/ISACALogin/webruntime/component/latest/prod/en-US/",
"imports": {
"/webruntime/component/latest/prod/en-US/lwc": "/ISACALogin/webruntime/framework/6a3c3d3354/prod/lwr_lwc",
"@app/csrfToken": "/ISACALogin/webruntime/module/@app/csrfToken",
"@app/loginPath": "/ISACALogin/webruntime/module/@app/loginPath",
"@app/user": "/ISACALogin/webruntime/module/@app/user",
"@perm/": "/ISACALogin/webruntime/perm/",
"@salesforce/client/formFactor": "/ISACALogin/webruntime/module/@salesforce/client/formFactor",
"@salesforce/customPermission/": "/ISACALogin/webruntime/perm/custom/",
"@salesforce/featureFlag/": "/ISACALogin/webruntime/module/@salesforce/featureFlag/",
"@salesforce/user/Id": "/ISACALogin/webruntime/module/@salesforce/user/Id",
"@salesforce/user/isGuest": "/ISACALogin/webruntime/module/@salesforce/user/isGuest",
"@salesforce/userPermission/": "/ISACALogin/webruntime/perm/",
"@udd/": "/ISACALogin/webruntime/module/@udd/",
"@view/checkPasswordResetEmail": "/ISACALogin/webruntime/view/45ffe8a9b19462fbec5f0f766b545790/prod/en-US/checkPasswordResetEmail_view",
"@view/forgotPassword": "/ISACALogin/webruntime/view/ada0db98e964f9f271d01c719a90b544/prod/en-US/forgotPassword_view",
"@view/login": "/ISACALogin/webruntime/view/bafad66acd88db3ded94c0480754f2ff/prod/en-US/login_view",
"@view/register": "/ISACALogin/webruntime/view/cbc52cafc997bf45f1d5f168b1ba2486/prod/en-US/register_view",
"@view/scopedHeaderAndFooter": "/ISACALogin/webruntime/view/fca6d3f095737b6ec4d54af05b364827/prod/en-US/scopedHeaderAndFooter_view",
"force/ldsEngineWebruntime": "/ISACALogin/webruntime/component/04ded91df38779ef1cdd1d4d1ddb7773/prod/en-US/force/ldsEngineWebruntime_cmp",
"force/luvioLwcBindings": "/ISACALogin/webruntime/component/f73cfbd9d488458309ccf44ab292030e/prod/en-US/force/luvioLwcBindings_cmp",
"force/luvioRuntimeWebruntime": "/ISACALogin/webruntime/component/89aed88bb630f96ff5cde51c8f418dfc/prod/en-US/force/luvioRuntimeWebruntime_cmp",
"lightning/iconSvgTemplatesAction": "/ISACALogin/webruntime/component/511fcd61a806c0af605907b9b001fffd/prod/en-US/lightning/iconSvgTemplatesAction_cmp",
"lightning/iconSvgTemplatesActionRtl": "/ISACALogin/webruntime/component/1d957e7186f240e97cd0e1416eb511d2/prod/en-US/lightning/iconSvgTemplatesActionRtl_cmp",
"lightning/iconSvgTemplatesCustom": "/ISACALogin/webruntime/component/5b796e6461c5030ba4e5bbab8696b12c/prod/en-US/lightning/iconSvgTemplatesCustom_cmp",
"lightning/iconSvgTemplatesCustomRtl": "/ISACALogin/webruntime/component/67d65cfd9c91da365d36a591dfea9fca/prod/en-US/lightning/iconSvgTemplatesCustomRtl_cmp",
"lightning/iconSvgTemplatesDoctype": "/ISACALogin/webruntime/component/dcea007bd2f350cb663d39565b9a7b58/prod/en-US/lightning/iconSvgTemplatesDoctype_cmp",
"lightning/iconSvgTemplatesDoctypeRtl": "/ISACALogin/webruntime/component/fbb50de7c535968af91dff1494307c1f/prod/en-US/lightning/iconSvgTemplatesDoctypeRtl_cmp",
"lightning/iconSvgTemplatesStandard": "/ISACALogin/webruntime/component/27c7802ce8a02ac691c572130e4a7692/prod/en-US/lightning/iconSvgTemplatesStandard_cmp",
"lightning/iconSvgTemplatesStandardRtl": "/ISACALogin/webruntime/component/0a7276f6e3c1e0b2b679a435e5fc40cf/prod/en-US/lightning/iconSvgTemplatesStandardRtl_cmp",
"lightning/iconSvgTemplatesUtility": "/ISACALogin/webruntime/component/9522a879d47f401a5a8a78d87b051c42/prod/en-US/lightning/iconSvgTemplatesUtility_cmp",
"lightning/iconSvgTemplatesUtilityRtl": "/ISACALogin/webruntime/component/bd6d709652d1314 |
URL: https://isaca.my.site.com/ISACALogin/webruntime/co... Model: Joe Sandbox AI | {
"risk_score": 3,
"reasoning": "The provided JavaScript snippet appears to be a part of a larger application and does not contain any high-risk indicators. It primarily deals with environment settings, data management, and event handling within the application. While it uses some legacy practices like `XDomainRequest`, the overall behavior seems benign and aligned with typical application functionality. The risk score is low, as the script does not demonstrate any malicious intent or suspicious activities."
} |
(function() { LWR.define("force/ldsEnvironmentSettings",["exports"],function(n){n.EnvironmentSettings=void 0,(n.EnvironmentSettings||(n.EnvironmentSettings={})).ForceRecordTransactionsDisabled="forceRecordTransactionsDisabled";const e={[n.EnvironmentSettings.ForceRecordTransactionsDisabled]:"$Browser.S1Features.forceRecordTransactionsDisabled"};n.getEnvironmentSetting=function(n){if("undefined"==typeof window)return;const o=e[n];return void 0!==window.$A&&void 0!==o?window.$A.get(o):void 0},Object.defineProperty(n,"__esModule",{value:!0})});
})();(function() { LWR.define("force/luvioEngine",["exports"],function(e){var t;!function(e){e.Fulfilled="Fulfilled",e.Unfulfilled="Unfulfilled",e.Error="Error",e.Pending="Pending",e.Stale="Stale"}(t||(t={}));const{create:r,entries:s,freeze:n,keys:i,values:a,assign:o}=Object,{hasOwnProperty:h}=Object.prototype,{isArray:l}=Array,{push:c,indexOf:d,slice:u}=Array.prototype,{parse:p,stringify:v}=JSON,f=new WeakSet;let S=!1;function g(e){if(!S&&"object"==typeof e&&null!==e&&!f.has(e)){if(f.add(e),l(e))for(let t=0,r=e.length;t<r;t+=1)g(e[t]);else{const t=i(e);for(let r=0,s=t.length;r<s;r+=1)g(e[t[r]])}n(e)}}function m(e){return e.state===t.Error}function y(e){return e.state===t.Fulfilled}function b(e){return e.state===t.Stale}function k(e){return e.state===t.Unfulfilled}function M(e){return e.state===t.Pending}function I(e,r){g(e);return{error:e,state:t.Error,data:void 0,refresh:r}}function w(e){return void 0!==e&&void 0!==e.then}function R(e,t=[]){for(const r of t)switch(e.type){case"cache-miss-out-of-ttl":r.onCacheMissOutOfTtl&&r.onCacheMissOutOfTtl(e);break;case"data-out-of-ttl-duration-update":r.onDataOutOfTtlDurationUpdate&&r.onDataOutOfTtlDurationUpdate(e);break;case"store-reset":r.onStoreReset&&r.onStoreReset(e);break;case"store-publish":r.onStorePublish&&r.onStorePublish(e);break;case"store-snapshot-emit":case"store-snapshot-rebuild":case"store-snapshot-refresh":case"store-snapshot-subscribe":case"store-snapshot-unsubscribe":r.onStoreSnapshotEvent&&r.onStoreSnapshotEvent(e)}}function T(e,t=[]){for(const r of t)switch(e.type){case"custom":r.onCustomAdapterEvent&&r.onCustomAdapterEvent(e);break;case"environment":r.onEnvironmentEvent&&r.onEnvironmentEvent(e);break;default:r.onAdapterEvent&&r.onAdapterEvent(e)}}function P(e,t,r,s){return function(...n){T(r,t);try{const i=e(...n);return w(i)?i.then(e=>(T(s(e,!1,!0,r),t),e)).catch(e=>{throw T(s(e,!0,!0,r),t),e}):(T(s(i,!1,!1,r),t),i)}catch(e){throw T(s(e,!0,!1,r),t),e}}}const E=Promise.resolve();function O(e){setTimeout(()=>{throw e},0)}function C(){let e=Date.now()-5001;return(t,r)=>{const s=Date.now();if(e+5e3<s)return e=s,n=t,E.then(n).catch(O),r();var n;r()}}var K,N,L,x;function D(e){if(e&&e.toJSON&&"function"==typeof e.toJSON&&(e=e.toJSON()),void 0===e)return;if("number"==typeof e)return isFinite(e)?""+e:"null";if("object"!=typeof e)return v(e);let t,r;if(l(e)){for(r="[",t=0;t<e.length;t++)t&&(r+=","),r+=D(e[t])||"null";return r+"]"}if(null===e)return"null";const s=i(e).sort();for(r="",t=0;t<s.length;t++){const n=s[t],i=D(e[n]);i&&(r&&(r+=","),r+=v(n)+":"+i)}return"{"+r+"}"}function A(e){return e.__type===N.Error}!function(e){e[e.RESOURCE_NOT_FOUND=404]="RESOURCE_NOT_FOUND"}(K||(K={})),function(e){e.Error="error"}(N||(N={})),function(e){e[e.NotPresent=0]="NotPresent",e[e.RefNotPresent=1]="RefNotPresent",e[e.RefPresent=2]="RefPresent",e[e.Null=3]="Null",e[e.Missing=4]="Missing",e[e.Pending=5]="Pending"}(L||(L={})),e.StoreResolveResultState=void 0,(x=e.StoreResolveResultState||(e.StoreResolveResultState={}))[x.Found=0]="Found",x[x.Error=1]="Error",x[x.Null=2]="Null",x[x.NotPresent=3]="NotPresent",x[x.Stale=4]="Stale";const $=new WeakMap;function q(e){if("string"==typeof e)return e;const t=$.get(e);if(void 0===t){const t=D(e);return $.set(e,t),t}return t}const _="Undefined value used in StoreKeyMap operation";class j{constructor(){this.keyMap=new Map,this.valueMap=new Map}clear(){this.valueMap.clear(),this.keyMap.clear()}delete(e){const t=q(e);i |
URL: https://isaca.my.site.com/ISACALogin/webruntime/co... Model: Joe Sandbox AI | {
"risk_score": 4,
"reasoning": "The provided JavaScript snippet appears to be a part of a larger runtime library, and it does not contain any obvious high-risk indicators. However, there are some moderate-risk behaviors that warrant further review:
1. External Data Transmission: The script sends data to external domains (e.g., `analytics.example.com`) via `XHR` or `fetch`, which could potentially include sensitive user information.
2. Fallback Domains: The script may use multiple fallback domains, which could be a concern if one of the domains is untrusted.
3. Aggressive DOM Manipulation: The script appears to repeatedly alter or clear the DOM, which could potentially impact the user experience or introduce vulnerabilities.
Additionally, the use of the legacy `XDomainRequest` API is a low-risk indicator, as it poses minor risks but is not inherently malicious.
Overall, the script seems to have a mix of behaviors that require further investigation to determine the full context and intent. A risk score of 4 (Medium Risk) is assigned, and the script should be reviewed more closely to ensure it is not engaging in any suspicious or malicious activities."
} |
(function() { LWR.define("force/luvioRuntime",["exports"],function(e){const{create:t,freeze:r,keys:i}=Object,{hasOwnProperty:s}=Object.prototype,{isArray:n}=Array,{push:o,indexOf:a,slice:c}=Array.prototype,{stringify:u}=JSON;function h(e){if(e&&e.toJSON&&"function"==typeof e.toJSON&&(e=e.toJSON()),void 0===e)return;if("number"==typeof e)return isFinite(e)?""+e:"null";if("object"!=typeof e)return u(e);let t,r;if(n(e)){for(r="[",t=0;t<e.length;t++)t&&(r+=","),r+=h(e[t])||"null";return r+"]"}if(null===e)return"null";const s=i(e).sort();for(r="",t=0;t<s.length;t++){const i=s[t],n=h(e[i]);n&&(r&&(r+=","),r+=u(i)+":"+n)}return"{"+r+"}"}function d(e){return y(e)?e.then(e=>e):{then:(t,r)=>{if(t)try{return d(t(e))}catch(e){return l(e)}return d(e)}}}function l(e){return y(e)?e.then(e=>e):{then:(t,r)=>{if(r)try{return d(r(e))}catch(e){return l(e)}return l(e)}}}function y(e){return e instanceof Promise||"object"==typeof e&&null!==e&&s.call(e,"then")&&"function"==typeof e.then}function m(e){return e instanceof Error?e:new Error(`${e}`)}class p extends Error{}class b{read(e){const{l1Cache:t,readFromL1:r}=e;return d(r(t))}write(e){const{l1Cache:t,writeToL1:r}=e;return r(t),d(void 0)}}class f{constructor(){this.data={}}clear(){this.data={}}delete(e,t){delete this.data[e]}get(e,t){return this.data[e]}set(e,t,r){this.data[e]=t}length(){return this.keys().length}keys(){return new g(Object.keys(this.data))}}class w{constructor(){this.data={}}clear(){this.data={}}delete(e,t){delete this.data[e]}get(e,t){return this.data[e]}set(e,t,r){this.data[e]=t}setPartial(e,t,r){const i=this.get(e);if(void 0===i)throw new Error(`Metadata for key "${e}" not found`);this.data[e]={...i,...t}}expire(e,t){const{expirationTime:r=Date.now()}=t||{};this.setPartial(e,{expirationTime:r})}}class g{constructor(e){this.data={},this.lengthInternal=0,e&&e.forEach(e=>{this.add(e)})}add(e){this.data[e]=!0,this.lengthInternal++}contains(e){return!0===this.data[e]}elements(){return Object.keys(this.data)}get length(){return this.lengthInternal}overlaps(e){const t=e.elements();for(let e=0;e<t.length;++e)if(this.contains(t[e]))return!0;return!1}difference(e){const t=new g;return this.elements().forEach(r=>{e.contains(r)||t.add(r)}),t}isSubsetOf(e){return 0===this.difference(e).length}equals(e){return this.length===e.length&&this.elements().every(t=>e.contains(t))}}class R{constructor(e){this.baseStore=e,this.keysRead=new g,this.missingKeysRead=new g,this.keysUpdated=new g}delete(e,t){this.keysUpdated.add(e),this.baseStore.delete(e,t)}get(e,t){this.keysRead.add(e);const r=this.baseStore.get(e,t);return void 0===r&&this.missingKeysRead.add(e),r}set(e,t,r){this.keysUpdated.add(e),this.baseStore.set(e,t,r)}length(){return this.baseStore.length()}keys(){return this.baseStore.keys()}}class k{constructor(e,t,r=Date.now()){this.baseStore=e,this.metadataRepository=t,this.now=r}delete(e,t){this.baseStore.delete(e,t)}get(e,t){const r=this.metadataRepository.get(e);if(!(r&&r.expirationTime<=this.now))return this.baseStore.get(e,t)}set(e,t,r){this.baseStore.set(e,t,r)}length(){return this.keys().length}keys(){return new g(this.baseStore.keys().elements().filter(e=>void 0!==this.get(e)))}}function v(e){const{data:t,errors:r}=e,i=void 0!==t&&0===r.length,s=r.length>0&&!(r[0]instanceof p);return i||s}class C{constructor(e){this.runtime=e,this.policyName="cache-then-network"}run(e){const{readFromCache:t,readFromNetwork:r,writeToCache:i,buildResult:s}=e,n=Date.now();let o=new k(this.runtime.store,this.runtime.metadataRepository,n);const{readFromCache:a,readFromNetwork:c,writeToCache:u}=this.runtime.requestDeduplicationService.applyDedupe({readFromCache:e=>this.readWithValidation(()=>t(e)),readFromNetwork:r,writeToCache:(e,t)=>this.writeWithValidation(()=>i(t,e,this.runtime.metadataRepository,this.runtime.keySubscriptionService))});return a(o).then(e=>v(e)?e:c().then(e=>u(this.runtime.store,e).then(()=>e)).then(e=>{const t=s(e,this.runtime.store);return this.runtime.cachePolicyValidator.validateBuildRes |
URL: https://isaca.my.site.com/ISACALogin/webruntime/vi... Model: Joe Sandbox AI | ```json
{
"risk_score": 3,
"reasoning": "The script does not exhibit high-risk behaviors such as dynamic code execution or data exfiltration. It primarily involves object manipulation and utility functions. There is no indication of external data transmission or interaction with suspicious domains. The use of complex object handling and potential for aggressive DOM manipulation suggests a need for review, but no clear malicious intent is present."
} |
(function() { LWR.define("experience/utilsInternal",["exports"],function(e){const t=Object.prototype.toString,n=Object.prototype.hasOwnProperty,r=Function.prototype.toString,o=r.call(Object);function i(e){return"function"==typeof e}function c(e){return"object"==typeof e&&null!==e}function s(e){return i(e)||c(e)}function u(e){return t.call(e)}function a(e){if(!c(e)||"[object Object]"!==u(e))return!1;const t=Object.getPrototypeOf(Object(e));if(null===t)return!0;const s=n.call(t,"constructor")&&t.constructor;return i(s)&&s instanceof s&&r.call(s)===o}function l(e){return null==e}const f="#REF:$";function p(e,t){return e.localeCompare(t)}function y(e,t,n,r,o=f){if(!c(e))return e;const i=e;return n.has(i)?e:(n.set(i,o),Array.isArray(i)?i.map((e,i)=>{const c=`${o}[${String(i)}]`;return y(e,t,n,r,c)}):a(e)?Object.keys(e).sort(t).reduce((i,c)=>{const s=`${o}.${c}`;return i[c]=y(e[c],t,n,r,s),i},{}):e)}function d(e,t=[],n="#REF:$"){if(c(e)&&!Object.isFrozen(e)){const r=e;if("undefined"==typeof window&&!a(r)&&!Array.isArray(r)){const e=`unsupported type '${u(r)}' found at '${n}'`;t.push(new Error(e))}Object.freeze(r);for(const e of Object.keys(r))d(r[e],t,`${n}.${e}`)}const r=Object.create(null);return Object.defineProperty(r,"value",{enumerable:!0,value:e}),Object.defineProperty(r,"errors",{enumerable:!0,value:t}),r}const b=new WeakSet;function h(e,t){try{const n=Reflect.get(e,t);Reflect.defineProperty(e,t,{enumerable:!0,get:()=>"object"==typeof n&&null!==n?g(n):n})}catch{}}function g(e){if("object"!=typeof e||null===e||b.has(e))return e;if(b.add(e),Object.isFrozen(e)){const t=Array.isArray(e)?[]:Object.create(Object.getPrototypeOf(e));for(const[n,r]of Object.entries(e))Reflect.set(t,n,"object"==typeof r&&null!==r?g(r):r);return Object.freeze(t)}for(const t of Object.keys(e))h(e,t);return Object.freeze(e)}function m(e,t,n){const r=n=>String.prototype.split.call(t,n).filter(Boolean).reduce((e,t)=>null!=e?e[t]:e,e),o=r(/[,[\]]+?/)||r(/[,[\].]+?/);return void 0===o||o===e?n:o}function j(){const e=[],t=[],n=new WeakMap,r="#REF:$";function o(e,o){const i=String(e),s=n.get(this),u=s?s+(Array.isArray(this)?`[${i}]`:"."+i):Array.isArray(this)?`[${i}]`:i;if(!c(o)||o!==Object(o))return void 0===o?(t.push(u),"#REF:undefined"):o;const a=o;if(n.has(a)){const e=n.get(a);return e?`${r}${"["===e[0]?"":"."}${e}`:r}return n.set(a,u),a}return o.errors=()=>e,o.pathsUndefined=()=>t,o}function v(){const e=new Map,t="#REF:$";function n(t,n){const r=e.get(t);let o=t.substring(6);0===o.indexOf(".")&&(o=o.substring(1));const i=o?m(n,o):n;for(const e of r)e.value[e.key]=i;e.delete(t)}return function(r,o){if("string"==typeof o&&0===o.indexOf(t))return e.has(o)||e.set(o,[]),e.get(o).push({value:this,key:r}),o;if(!c(o)||o!==Object(o))return"string"==typeof o&&"#REF:undefined"===o?void 0:o;if(""===r){const t=this[""];for(const r of e.keys())n(r,t)}return o}}const O="#REF:$";function w(e,t,n,r,o=O){if(e===t)return!0;if(null==e||null==t||"object"!=typeof e||"object"!=typeof t)return e!=e&&t!=t;if(n.has(e))return n.get(e)===t;if(n.set(e,t),Array.isArray(e)){const i=e.length;if(!Array.isArray(t)||i!==t.length)return!1;for(let c=i;0!=c--;){const i=`${o}[${String(c)}]`;if(!w(e.at(c),t.at(c),n,r,i))return!1}return!0}if(a(e)){const i=Reflect.ownKeys(e),c=i.length;if(!a(t)||c!==Reflect.ownKeys(t).length)return!1;for(let s=c;0!=s--;){const c=i.at(s),u=`${o}.${String(c)}`;if(!Reflect.has(t,c)||!w(Reflect.get(e,c),Reflect.get(t,c),n,r,u))return!1}return!0}return!1}const A=function(){let e=0;return()=>i(crypto?.randomUUID)?crypto.randomUUID():i(crypto?.getRandomValues)?[1e7,1e3,4e3,8e3,1e11].join("-").replace(/[018]/g,e=>(Number(e)^crypto.getRandomValues(new Uint8Array(1))[0]&15>>Number(e)/4).toString(16)):String(++e)}();const R=new WeakMap,$=new WeakMap,k=new WeakMap;function S(e){return!!R.has(e)&&(clearTimeout(R.get(e)),$.has(e)&&clearTimeout($.get(e)),R.delete(e),$.delete(e),k.delete(e),!0)}const P=Symbol(),F=["connect","disconnect","update"];function D(e,t){const n=Reflect.get( |
URL: https://isaca.my.site.com/ISACALogin/login Model: Joe Sandbox AI | {
"contains_trigger_text": true,
"trigger_text": "Are you an employee? Log in",
"prominent_button_name": "unknown",
"text_input_field_labels": "unknown",
"pdf_icon_visible": false,
"has_visible_captcha": false,
"has_urgent_text": false,
"has_visible_qrcode": false,
"contains_chinese_text": false,
"contains_fake_security_alerts": false
} |
|
URL: https://isaca.my.site.com/ISACALogin/login Model: Joe Sandbox AI | {
"brands": "unknown"
} |
|