We've just had reports of people seeing this while installing our chrome extension. I'm not near a Windows VM right now, but I can see if it's easy to reproduce when I get back:
http://getsatisfaction.com/dotspots/topics/dotspots_plugin_for_chrome_installer_problems There's a lot of embedded CSS in the script, as well as HTML snippets. It's the same virus report as Daniel earlier: "HTML/Crypted.Gen". Matt. On 30-Nov-09, at 9:20 AM, Joel Webber wrote: > If you can find out what was triggering this from Avira, I'd really > like to see it. This is probably the third-ish time we've seen a > report like this, and it would be really helpful to understand what > kind of virus snippets they're looking for. If there's something we > can do in our code gen to avoid the problem in the future, it would > probably be worth it. > > On Mon, Nov 30, 2009 at 10:19 AM, Thomas Broyer <[email protected]> > wrote: > > On Nov 30, 3:43 pm, BobV <[email protected]> wrote: > > On Sat, Nov 28, 2009 at 10:54 AM, Ray Ryan <[email protected]> wrote: > > > Does one app make heavier use of CssResource than the other? A > bell is > > > ringing about mhtml security concerns. Or did we back out our > mhtml use? > > > > I disabled MHTML support in r6839 (trunk) and r6840 (2.0) because it > > has too many browser/OS gotchas to be reliable for the 2.0 release. > > And it couldn't have been MHTML in our case, as we're serving the app > with HTTPS, which is sniffed in MhtmlClientBundleGenerator to fall > back to a "one file/request per resource" (otherwise, the "mhtml:" > pseudo-protocol causes a "mixed content" warning in IE). > > -- > http://groups.google.com/group/Google-Web-Toolkit-Contributors > > > -- > http://groups.google.com/group/Google-Web-Toolkit-Contributors -- http://groups.google.com/group/Google-Web-Toolkit-Contributors
