MPP Assistant by RoxasYTB (Last Version Auto) was reported 05.01.2026 for İzin verilmeyen harici kod

The reporter said:

The script retrieves a URI and then uses eval(), which is extremely risky. Additionally, it breaches the guideline on Injection of scripts from the originating host (see here), stating that "If https://example.com/script.js is injected onto https://differentsite.com, this is prohibited." The userscript operates on MPP clones but retrieves data from outside its origin.

This script has had 2 previous upheld or fixed reports.

RoxasYTB (the reported user) has made:

Bu rapor moderatör tarafından onaylanmıştı