In this case, the script is not entered until you open the popup. As soon as the popup is loaded, it enters send_links.js , which in turn sends a message as soon as this is done, receiving links. You can cancel this messaging and paste the file into the manifest:
"content_scripts": [{ "matches": ["<all_urls>"], "js": ["send_links.js"] }],
add a message handler to send_links.js with support for sending a response
chrome.extension.onMessage.addListener(function(message,sender,sendResponse){ [...] sendResponse(links); });
and then replace the onMessage and executeScript in the executeScript popup sendMessage callback
chrome.windows.getCurrent(function (currentWindow) { chrome.tabs.query({active: true, windowId: currentWindow.id},function(tab) { chrome.tabs.sendMessage(tab[0].id, {method: "getlinks"},function(links){ for (var index in links) { allLinks.push(links[index]); } allLinks.sort(); visibleLinks = allLinks; showLinks(); }); }); });
This layout will put send_links.js on every page so you can debug it more easily. Once this is a mistake, you can return to the software injection, because in such cases it is more effective. You can find the script under Sources> Content Scripts> One of them ( plfdheimenpnchlahmhicnkejgmhjhom for example).
Edited Source Files
Beardfist
source share