Built by Jared, named after the delightfully unhinged Misu 🐱
****SECURITY RESEARCH TOOL****
Test Purpose: The tests below with RED buttons should FAIL in a secure browser environment,
but if they succeed despite your security controls, they prove the fundamental vulnerability this test
demonstrates.
Enable all relevant DLP controls before testing, including:
Block all file downloads
Block all printing capabilities
Disable native messaging hosts
Prevent file saving/exporting
Block clipboard operations
Disable browser extensions
Expected Result: Red buttons should still work, proving local applications can bypass
browser-based DLP controls.
MISU SERVER STATUS Required
First, verify that Misu's clever server is running and ready to serve data:
What this demonstrates: Just like Box Edit, Misu's server runs on localhost.
Misu's web tricks can communicate with it even if downloads are blocked by the browser or DLP policies.
SENSITIVE DATA DISPLAY Confidential
The following sensitive information is displayed on this secure webpage. Click in the box below to edit the data:
Test data extraction methods:
Security Risk: This sensitive employee data is displayed and editable on the webpage.
Try editing the data above, then test both extraction methods. The bypass method uses localhost communication
to extract data to local files, while the direct download should be blocked by DLP controls.
PRINT BYPASS High Risk
Send content directly to the printer using bypass method:
Security Impact: Local applications can print documents even if the browser
has printing disabled. Box Edit style method opens documents in Notepad for review/printing.
Test: The "Browser Print" button uses browser print API - this should be blocked
by secure browsers, while the Box Edit style bypass succeeds.
CUSTOM FILE SAVE High Risk
Save custom content to the server directory:
Security Impact: Files are saved directly to the server's running directory,
making them easily accessible alongside the server files. Any content displayed in the browser
can be extracted and saved locally through the helper application, regardless of browser security
settings.
Test: This demonstrates how local applications can save arbitrary content to the
filesystem, bypassing any browser-based file save restrictions through localhost communication.