►
From YouTube: Inspector protocol in production
Description
OpenJS Foundation Collaborator Summit, Berlin, 2019
A
B
A
Exciting
part,
and
in
first
issue
that
actually
it
my
main
main
issue
for
me
right
now,
just
because
I'm
trying
to
go
this
debugger
for
no
justice,
no
or
production
budget
partial
about
production,
but
you
use
child
processes
is
actually
how
to
debug
child
process.
The
problem
is
that
it's
very
critical
export
using
WebSockets
and
inspector
by
yourself
try
to
generate
some
port
and
by
default
it
to
use
one
port
definitely
doesn't
work.
A
Do
you
have
multiple
processors,
but
it
can
automatically
generate
random
port
if
you
pass
zero
and
after
you
pass
zero,
the
main
questions
how
to
get
this
generated
port
back
sectional
connect
and
right
now
the
approach
that
is
super
ugly.
It's
only
works
when
you
can
control
foul
notice
about
them.
You
just
parse
the
city
error
and
gives
us
WebSocket
you
are
out
of
here,
but
if
chanters
you
to
see
the
error
or
something
like
this,
it
will
not
work
so
have
anyone
debug
child
processes,
okay,.
B
A
So
the
possible
solutions
here,
it's
the
main
problems,
artificial-
how
to
discover
this
port,
how
to
report
its
part.
It's
probably
can
use
some
alternative
transport
to
report.
This
part,
for
example,
diagnostic,
require
little
just
introduced
an
experimental,
and
maybe,
if
you
have
some
other
ideas,
how
can
report
it
and
can
be
easily
consumed
by
your
tool?
It
will
be
nice.
C
So
I
know
vias
code
allows
to
attach
to
like
note
processes
that
don't
even
explicitly
open
dance
back
port.
Yet
oh
maybe
list
them
all.
So
maybe
look
through
how
to
a
did
that
yeah.
C
A
A
The
main
problem,
the
man
and
biggest
topic
actually
I,
believe
I
of
robots
actually
secures
is
how
is
it
secure
to
his
practical
production
from
one
point
of
view?
As
long
as
you
are
not
leaking
WebSocket
URL,
it
should
be
fine,
but
at
the
same
time
I
remember.
The
second
part
of
security
is
not
exposing
too
much
information
as
possible,
and
now,
if
you
leak
for
a
second
URL
someone
get
for
access
to
protocol,
it
come,
someone
can
debug,
it
can
execute
remote
code
and
anything
like
this.
A
D
E
A
It's
very
good
point.
First
of
all,
there
are
some
very
simple
layer
of
security
right
now
that
you
need
to
get
full
WebSocket
URL
to
come
back
textual,
but
unfortunately,
by
default
note
on
the
port
on
the
inspector
port.
Not
you'll,
expose
Jason
end
point
where
you
can
go
and
get
its
full
website
URL.
So
the
first
measure
very
straightforward.
They
actually
have
four
requests
to
introduce
a
flag
that.
A
A
So,
first
firmly
sexual
licking,
the
staff
secretary
RL.
If
you
can
avoid
licking,
it
will
define,
but
I
mean
if
it's
final
licked.
Another
problem
is
actually
exposing
too
much
information
and
one
of
the
suggestion
by
Ally
and
China
Yujin
was
that
we
need
to
whitelist
the
miles
that
actually
available
a
lot.
A
It
might
work,
I
mean
if
you
need
to
only
profiler,
or
only
if
you
only
some
part
of
protocol,
possibly
work,
but
at
the
same
time,
protocol
by
itself
was
not
designed
to
be
right
in
this
environment,
for
example,
you
need
travel
time
demand
for
a
lot
of
inspection,
and
if
you
enable
in
profiler
you
cannot
get
it.
If
you
enable
and
keep
profiler
it's
much
harder
to
get
explicit
objects.
Is
that
sometimes
I
mean
it's
something
that
you
can
work
on,
but
it's
something
question
how
to
solve.
E
A
E
E
A
E
D
A
Delight
to
say
that
protocol,
if
we
instance
next
step
from
security
protocol
was
designed
to
the
way
is
a
it
is
rated
from
production
from
performance
point
of
view
from
I'm,
mostly
from
performance
point
of
view,
and
actually
used
to
automate
crump
a
lot
and
used
by
different
companies
and
Thunder
I
mean
the
only
aspect
that
was
not
to
compliant
time
for
a
desired
for
security.
I
mean
security
was
support
for.
Why
not
it?
A
C
A
C
A
C
D
A
You'd
like
to
get
objects
back,
then
the
objects
back
rent,
an
immense
lecture
demise
arts
expose
all
objects.
Instruction
in
bloom
enter
everything
about
this
action,
so
you
can
get
your
profile
but
yeah.
You
can
load
it
or
automatically
analyze
it,
but
if
you'd
like
to
inspect
it
and
get
better
picture
of
what
is
actually
new
he'll
be
intern
time
limited.
That's
how
to
practice.
I
mean
I
notice
that
most
stop
he'll
work
and
you'll
be
able
to
get
a
lot
of
me
on
date
out
of
it,
but
it
was.
D
D
B
A
B
A
B
B
A
Yeah
they
use
finally,
most
like
today,
you
suspect,
but
I
need
to
check
hidden
and
as
a
possible
solution
for
the
security
problem
is,
do
not
use
WebSocket
and
use
alternative
transport
layer
on
vibes
it
just
derailed,
born
in
locally
and
inspected
by
production
of
work
in
progress
by
you.
Drill
I
will
help
using
to
finish
it
and
it'll
solve
some
problems.
For
example,
chrome,
when
exposing
protocol
is
pipe.
When
requires
mechanic
security.
Well
again,
it's
it's
two
different
problems.
Access
protocol
and
what
further
Cox
falls
problems
are
spread,
is
much
easier
to
solve.
I.
B
A
A
And
something
not
about
dishes
but
fishy
requests.
Network
inspection
is
a
blow
from
dirty
conference
and
people
start
to
use
inspector
say
very
fast.
Go
to
the
point
where
they'd
like
to
have
some
way
to
network
and
the
main
problem
is
cow
and
act
not
here
and
what
we
should
search.
I
mean
I
took
12
and
yeah.
It's
just
if
you'd
like
to
talk
about
network
inspection,
if
you
need
metal
construction
and
if
you
like
to
help
us
there,
please
join
hello
from
diagnostic
issues,
song
right
now,
I'm
a
teacher
pass
against
engineer.