Whop app iframe — full attack surface demonstration
Collecting...
Forging @whop/iframe SDK messages via postMessage
to extract data and trigger actions as the victim.
Requests from *.apps.whop.com to whop.com include all cookies
(httpOnly + session). Server returns 200 OK.
allow-top-navigation + SDK openExternalUrl = redirect victim to phishing page.
// Via sandbox: top.location = "https://attacker.com/fake-login";
// Via SDK: postMessage({ event: "openExternalUrl", data: { url: "..." } });
Waiting...