
TOTP geliştiren: Turistu
A TOTP generator that could be used with gmail, github and other sites which require 2FA.
Bu uzantıyı kullanmak için Firefox’a ihtiyacınız var
Uzantı meta verileri
Ekran görüntüleri














Bu uzantı hakkında
This is a javascript implementation of a TOTP authenticator, using the browser's crypto API. It should do the exactly same thing as google's authenticator, the "oathtool --totp -b ..." command, or any other TOTP generating app.
The javascript code does not send to or fetch any data from anywhere remotely, and it should work the same when served over https, saved locally or used inside a browser extension.
Instead of implementing its own secret saving mechanism (with cookies or local storage), this extension is using the browser's password manager to save the TOTP keys, just like any other passwords.
Since the saved keys are attached to the extension's own "moz-extension://UUID" url, not to the website where they are used, it's not possible for hijacked websites to retrieve them by exploiting the form and passwords autofill mechanism.
This extension is also not using any content script which could be tricked into generating and filling in TOTP codes without user intervention.
Note for Linux/X11 users: Since their half-fix to the exploitable pastejack bug that I have reported, it's no longer possible to copy the totp code to the primary selection automatically upon it being generated. If you still want to paste it with a simple middle-button click, just click once more on the totp code when you see the "copied (for ctrl-V)" message. Sorry for that.
The javascript code does not send to or fetch any data from anywhere remotely, and it should work the same when served over https, saved locally or used inside a browser extension.
Instead of implementing its own secret saving mechanism (with cookies or local storage), this extension is using the browser's password manager to save the TOTP keys, just like any other passwords.
Since the saved keys are attached to the extension's own "moz-extension://UUID" url, not to the website where they are used, it's not possible for hijacked websites to retrieve them by exploiting the form and passwords autofill mechanism.
This extension is also not using any content script which could be tricked into generating and filling in TOTP codes without user intervention.
Note for Linux/X11 users: Since their half-fix to the exploitable pastejack bug that I have reported, it's no longer possible to copy the totp code to the primary selection automatically upon it being generated. If you still want to paste it with a simple middle-button click, just click once more on the totp code when you see the "copied (for ctrl-V)" message. Sorry for that.
Deneyiminize puan verin
Daha fazla bilgi
- Eklenti bağlantıları
- Sürüm
- 1.2.8
- Boyut
- 12,99 KB
- Son güncelleme
- 2 yıl önce (22 Kas 2023)
- İlgili kategoriler
- Lisans
- Yalnızca GNU Genel Kamu Lisansı v3.0
- Sürüm geçmişi
Koleksiyona ekle
1.2.8 sürüm notları
since the half-fix was back ported to ESR and thunderbird, assume that selectAllChildren() doesn't set the primary selection on *any* version of firefox anymore.
Turistu tarafından geliştirilen diğer uzantılar
- Henüz hiç puan yok
- Henüz hiç puan yok
- Henüz hiç puan yok
- Henüz hiç puan yok
- Henüz hiç puan yok
- Henüz hiç puan yok