← Back to context

Comment by htrp

6 months ago

> So, Google Chrome gives all *.google.com sites full access to system / tab CPU usage, GPU usage, and memory usage. It also gives access to detailed processor information, and provides a logging backchannel.

So I guess the question becomes how quickly you can spoof this ?

Wouldn't you be able to deploy an app script website, which is hosted on "script.google.com" and make use of this?

If you mean can another domain trick Chrome into letting it access those APIs… probably not; it seems it’s based on the browser extension architecture which is already somewhat hardened and I believe doesn’t even load the code for the extension if you’re not on a matching domain (though the typical protection goes the other way around — preventing extensions from accessing website data without permission).

You just need to "register" a subdomain. So basically any google employee has potentially full access to your system?

  • You’re likely severely underestimating the amount of internal paperwork and review that is required to launch a new google.com subdomain.

  • Or anyone who controls your DNS resolution which has a number of paths (for example a local hosts file, possibly a router, changing your config or how you get your config to a malicious DNS server, etc)

  • In what world does "system / tab CPU usage, GPU usage, and memory usage" mean "full access to the system"? Any Chrome extension can access this info easily, the point that the tweet makes is that there's a built-in Chrome extension that shares this info with Google's own websites without any confirmation.

  • > full access to your system

    Only to leak your CPU/GPU utilization though as far as I understand it. Those can also be exposed in other ways by legitimate JS/WebGPU by measuring/profiling shader runs/etc.

Pretty much impossible, would need to defeat https/ct. You would have to spoof *.google.com within chrome.

  • So if you install your own certificate authority and then spoof the DNS it might be possible? Not so useful as an attack vector, but potentially useful for people who want to do fun things with the browsers they own.

Don't have to spoof it - just put something on Google Docs and send people a link.

  • Google Docs is designed to not let you run arbitrary JS in a trusted (i.e. google.com origin) context, or else the author of any doc you visit could act as you on Google properties.