Replies: 1 comment
-
I checked with the security team and they don't think there is a safe way to do this with prefs. Most of these prefs aren't a part of Firefox anymore. Do you know the sites you'll be doing this with? |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hello,
I posted this on that one Reddit site and it was suggested that I reach out or help over here.
I am building some software to take screenshots of malicious websites using Firefox. When browsing to the malicious site, the "Warning Potential Security Risk Ahead" screen keeps getting the way. From researching, the following configuration should remove this, but it does not work.
at /usr/lib/firefox/mozilla.cfg
`
// IMPORTANT: Start your code on the 2nd line
lockPref("javascript.enabled", false);
// Bypass "Warning: Potential Security Risk Ahead" screens
lockPref("browser.ssl_override_behavior", 1);
lockPref("browser.xul.error_pages.enabled", true);
lockPref("browser.xul.error_pages.expert_bad_cert", true);
lockPref("security.certerrors.permanentOverride", true);
lockPref("security.certerrors.mitm.priming.enabled", false); `
then at /usr/lib/firefox/defaults/pref/autoconfig.js I have the following:
`
pref("general.config.filename", "mozilla.cfg");
pref("general.config.obscure_value", 0); // Use 0 to disable byte-shifting `
Does anyone know what is wrong with this? The browser does start with JavaScript disabled, so I know the files are being read.
Thank you
Beta Was this translation helpful? Give feedback.
All reactions