I guess you are looking 
for https://bugs.chromium.org/p/v8/issues/detail?id=178

This is a long standing feature request that has not been addressed yet. 
I'll add it to our backlog.

On Thursday, October 20, 2016 at 7:55:38 AM UTC+2, PhistucK wrote:
>
> File ​crbug.com/657697​ (and crbug.com/657700 for a related bug I found 
> as a result :(). But it is really a duplicate of crbug.com/496666 (so I 
> closed mine). I guess it will not be in progress soon. :(
>
>
> ☆*PhistucK*
>
> On Thu, Oct 20, 2016 at 8:19 AM, Jochen Eisinger <joc...@chromium.org 
> <javascript:>> wrote:
>
>> As far as I know that's not possible. Could you file a feature request 
>> for this (probably on crbug.com if you also want to cover DOM functions)
>>
>> On Wed, Oct 19, 2016 at 7:38 PM PhistucK <phis...@gmail.com <javascript:>> 
>> wrote:
>>
>>> I wanted to know whether there is a V8 (or Chrome) flag of some sort 
>>> that will let me add breakpoints on native function calls.
>>> I do not mean C++ functions, I mean built in web platform (or 
>>> ECMAScript) functions.
>>> My issue is that I click on a link and suddenly some code is apparently 
>>> calling document.location.replace("foo") or something and the page 
>>> redirects (maliciously). In order to find the calling code, I want to set a 
>>> breakpoint on calling document.location.replace, which is a native web 
>>> platform function, that is not writable (so I cannot override it with my 
>>> own function using Object.defineProperty, or use a proxy).
>>> (The code is apparently elusive and obfuscated somewhat, so it is not 
>>> just a search and replace)
>>> I tried using the Developer Tools API - debug(function), but it did not 
>>> break (even when I call it with setTimeout).
>>>
>>> A V8 flag (or a Chrome flag) that either lets me break on calling that 
>>> function, or that overrides the security feature that makes it 
>>> non-writable, or something like that, would let me see the code that calls 
>>> it and find the malicious way it does so.
>>>
>>> So, is there something like that?
>>>
>>> Thank you!
>>>
>>> -- 
>>> -- 
>>> v8-users mailing list
>>> v8-u...@googlegroups.com <javascript:>
>>> http://groups.google.com/group/v8-users
>>> --- 
>>> You received this message because you are subscribed to the Google 
>>> Groups "v8-users" group.
>>> To unsubscribe from this group and stop receiving emails from it, send 
>>> an email to v8-users+u...@googlegroups.com <javascript:>.
>>> For more options, visit https://groups.google.com/d/optout.
>>>
>> -- 
>> -- 
>> v8-users mailing list
>> v8-u...@googlegroups.com <javascript:>
>> http://groups.google.com/group/v8-users
>> --- 
>> You received this message because you are subscribed to a topic in the 
>> Google Groups "v8-users" group.
>> To unsubscribe from this topic, visit 
>> https://groups.google.com/d/topic/v8-users/j2CPHefGEmQ/unsubscribe.
>> To unsubscribe from this group and all its topics, send an email to 
>> v8-users+u...@googlegroups.com <javascript:>.
>> For more options, visit https://groups.google.com/d/optout.
>>
>
>

-- 
-- 
v8-users mailing list
v8-users@googlegroups.com
http://groups.google.com/group/v8-users
--- 
You received this message because you are subscribed to the Google Groups 
"v8-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to v8-users+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to