<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: userscripts</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/userscripts.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2007-07-07T22:43:39+00:00</updated><author><name>Simon Willison</name></author><entry><title>Anyone who recently downloaded GreaseMonkey scripts from userscripts.org should check their scripts</title><link href="https://simonwillison.net/2007/Jul/7/jyte/#atom-tag" rel="alternate"/><published>2007-07-07T22:43:39+00:00</published><updated>2007-07-07T22:43:39+00:00</updated><id>https://simonwillison.net/2007/Jul/7/jyte/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://jyte.com/cl/anyone-who-recently-downloaded-greasemonkey-scripts-from-userscripts.org-should-check-their-scripts"&gt;Anyone who recently downloaded GreaseMonkey scripts from userscripts.org should check their scripts&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
I haven’t confirmed this, but this Jyte claim suggests that userscripts.org was hacked and cookie stealing code inserted in to some of the scripts. UPDATE: Not hacked; just bad scripts submitted through the regular process.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/greasemonkey"&gt;greasemonkey&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/jyte"&gt;jyte&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/userscripts"&gt;userscripts&lt;/a&gt;&lt;/p&gt;



</summary><category term="greasemonkey"/><category term="jyte"/><category term="security"/><category term="userscripts"/></entry></feed>