Skip to content

Filter obfuscated browser extension errors from Sentry#8477

Merged
iHiD merged 1 commit into
mainfrom
fix/8464
Feb 9, 2026
Merged

Filter obfuscated browser extension errors from Sentry#8477
iHiD merged 1 commit into
mainfrom
fix/8464

Conversation

@iHiD
Copy link
Copy Markdown
Member

@iHiD iHiD commented Feb 9, 2026

Closes #8464

Summary

  • Adds a new Sentry beforeSend filter to drop errors caused by obfuscated browser extensions or injected scripts
  • Detects hex-obfuscated variable names (_0x4761 etc.) in error messages via regex /_0x[0-9a-f]+/
  • Also filters errors with webkit-masked-url in stack frames (WebKit's masked URL for extension code)
  • Follows the same pattern as the existing 7 non-actionable error filters

Test plan

  • yarn test passes (160 suites, 1550 tests)
  • Pre-commit hook (prettier) passes
  • Filter follows identical pattern to existing filters in react-bootloader.tsx
  • No risk of false positives: esbuild minifier uses short letter names, not _0x hex names

🤖 Generated with Claude Code

Browser extensions using hex-obfuscated variable names (_0x4761 etc.)
trigger ReferenceErrors that are not bugs in Exercism code. Filter them
by detecting _0x hex patterns in error messages and webkit-masked-url
in stack frames.

Closes #8464

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@iHiD iHiD requested a review from dem4ron as a code owner February 9, 2026 11:05
@iHiD iHiD merged commit 4f5582a into main Feb 9, 2026
41 checks passed
@iHiD iHiD deleted the fix/8464 branch February 9, 2026 12:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

ReferenceError: Can't find variable: _0x4761

1 participant