Search for endpoints potentially vulnerable to Spectre..
Spectroscope is a prototype extension for security engineers and web developers to help track down application resources which aren't protected from being embedded by other websites. Such resources can, in some cases, be exfiltrated by malicious sites making use of CPU-level information leaks on users' devices, such as the spectre vulnerability.
The tool identifies resources which are exempt from default protections enabled in google chrome (Cross-origin read blocking, SameSite cookies) and which can be embedded cross-site. The results are added to Chrome's DevTools "Spectroscope" panel and include security recommendations to help protect your resources from Spectre and other cross-site attacks.
Note: This is a prototype extension which is meant to be used only as a convenience tool to help you protect your site; it is not an official google product. Testing your site with Spectroscope is not a substitute for careful deployment of recommended web security features. See https://w3c.github.io/webappsec-post-spectre-webdev/ for a complete list of best practices.
Authors (alphabetically): Roberto Clapis, Santiago Diaz, Aleksandr Dobkin, David Dworken, Artur Janc, Aaron Shim, Lukas Weichselbaum
You can Follow the below Step By Step procedure to install the Spectroscope Chrome Extension to your Chrome Web browser.
It is the Spectroscope Chrome extension download link you can download and install Chrome Browser.
Tags: Security Engineers , Convenience Tool , Web Security Features , Official Google Product , Web Developers , Include Security Recommendations , Google Chrome Cross , Roberto Clapis Santiago , Tool Identifies Resources , Janc Aaron Shim , Web Security , Cross Site , Embedded Cross Site , Cpulevel Information Leaks ,
A WebAudio based utility to show live audio spectroscopy