WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

610

(post is archived)

[–] 0 pt 4y

looks like poal code might be fucking with it.

Poal doesn't fuck with it. When the expando detects a bitchute links it loads the bitchute embed player in an iframe. Nothing on poal side is actually loaded.

[–] 0 pt 4y (edited 4y)

How is it processing the input data then? This is the type of shit zerodays are made from. You should block emedded bitchute links until this is resolved.

[–] 0 pt 4y

lol Go learn how iframes work.

Nothing is loaded on poal side.

The expando is opening an iframe with the bitchute url into the embed format. Nothing more. The player is loaded from bitchute.

[–] 0 pt 4y (edited 4y)

I understand its loaded from bitchute, but the unresolved and randomly activated input function is likely a vulnerability. You should block embedded or expando bitchute links until it is resolved.