[HELP] Anybody can fetch data with nui devtool

Hey,how could i fix this security hole, anybody can use the nui devtool to trigger any JS post function, example:
fetch("-๐ง๐ฎ๐ข ๐œ๐š๐ฅ๐ฅ๐›๐š๐œ๐ค-", {
method: โ€œPOSTโ€,
body: JSON.stringify({
-๐š๐ง๐ฒ- : -๐ฌ๐ญ๐ฎ๐Ÿ๐Ÿ- ,
})
});
or like this:
$.post(โ€˜https://esx_atm/depositโ€™, JSON.stringify({
amount: $("#amount").val()
}));

In our testing, users cannot send POST events from the DevTool, so you should be fine.
image
image

Did you try both methods and select the resource in the console?Cause on my server the second method works perfectly
image

1 Like

Itโ€™s not a security hole, the security hole is your resources being vulnerable to this.

Well yea,its just a devtool

I guess using JS obfuscater should be enough to fix vulnerable scripts

Obfuscating your code is not a solution, peoplo who want to abuse this can just deobfuscate them or literally use the network tab in devtools instead fix your actual scripts, add serverside checks.

Letโ€™s say, open your bank website and press f12, find the endpoint of โ€œdepositโ€ and do a fetchโ€ฆ is this a security hole in your browser? Not really since the request will fail since your bank does serverside checks.