来自:tetraph
"XSS auditor" is first published in 2010 by Google which is used to prevent reflected XSS Attacks.
However, we found the following string can bypass the filter.
<script>0,alert("XSS")</script>
The mechanism of the filter is very simple. It will checked whether the reflected codes contain the same content sent out from the user.
If there are same content, chromium will check whether the same content is in some tag such as <script></script>
<img > ...
If so, chromium will remove the same content from the reflected codes.
From:
https://tetraph.com/security/xss-vulnerability/google-chromium-xss-auditor-bypass/