-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Header Bidding and Malware #2646
Comments
External JS or libs from SSPs are not the source of redirects. Redirects are coming from the winning ads rendered on the page. |
Thank you. This is good information! I have raised the bid floor to $1.00 for all bidders. I hope this will keep the bad guys away. |
as of prebid 1.x, the referenced behavior (loading external JS by bidders) is not allowed. |
Thank you. That's good to know! |
I am having malvertising issues and just found this through a google search:
"Actually with header bidding each ad network can in theory execute any javascript they want even before they win or if they don't win at all. This is because most header bidding adapters execute at least some javascript from the ad network. See pulsepoint for example:
Prebid.js/src/adapters/pulsepoint.js
Line 12 in fd7ae19
Is this true?
From: https://www.reddit.com/r/adops/comments/6gimey/header_bidding_full_of_malware/
The text was updated successfully, but these errors were encountered: