Keeping track of 3rd party scripts, taking away obscurity
You'll know what gets delivered to your user's browser 100% of the time, and we'll make the scripts up to 30% faster.
3rd party scripts have unlimited reign in the browser of your users. When it goes wrong, it goes really wrong.
You don't know what the user gets in their browser
of most commonly used scripts change at least weekly
3rd-party scripts on
the average website
Featured in
PCI DSS 4.0 (specifically 6.4.3 and 11.6.1) mandates entities handling card data to implement tamper-detection mechanisms by March 31st, 2025. This aims to mitigate Magecart attacks by alerting on unauthorized changes to HTTP headers and payment content.
How we're different
c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.
All scripts get processed by us to continually enhance our detection capabilities. We monitor over 70 attributes and use various AI-driven techniques to review the scripts, making our solution the most advanced detection system in the space to date.
Use c/side on your ecommerce store. Whether you use Shopify, Magento, WooCommerce, Next.js, or virtually any front-end. c/side is available to you.
This week, we identified an intriguing use case involving the WP3[.]XYZ attack (link to our blog post). It sparked interest across the community and led to better detection rates on platforms like VirusTotal (VirusTotal link). While most appreciated our efforts, others criticized us for not identifying the root cause or recommending services to clean up hacked websites. Despite this, we aim to make the community aware of potential attacks and promise to do even better in the future. When fals
We’ve uncovered a widespread malware campaign targeting WordPress websites, affecting over 5,000 sites globally. The malicious domain: "https://wp3.xyz/plugin[.]php".
Content Security Policy (CSP) is a security feature provided by web browsers that a website owner can use to define a set of rules that control which resources (e.g., scripts, styles, images) can be loaded and executed by the browser. We call this the client-side, which is at the very end of the web supply chain. When properly configured, it helps prevent a wide range of attacks. But those first three words make all the difference. It can help prevent: Cross-Site Scripting (XSS): By restricti