MPP Assistant by RoxasYTB (Last Version Auto) was reported 05.01.2026 for İzin verilmeyen harici kod
The reporter said:
The script retrieves a URI and then uses
eval(), which is extremely risky. Additionally, it breaches the guideline on Injection of scripts from the originating host (see here), stating that "If https://example.com/script.js is injected onto https://differentsite.com, this is prohibited." The userscript operates on MPP clones but retrieves data from outside its origin.
This script has had 2 previous upheld or fixed reports.
RoxasYTB (the reported user) has made:
Bu rapor moderatör tarafından onaylanmıştı
