As a web developer I would like to have this feature too, because It’s odd to get flawed results from 3rd party payload while running performance tests or debugging/profiling.
KIS is even injecting its CSS/JS into websites that are running on localhost with no possibility to exlude a certain URL from this behaviour. The current workaround is to disable the injection completely, explicitely blocking the URLs within the dev-tools/when running Lighthouse CLI or by running the web server on a port that isn’t monitored.
As a user I would expect that if I add the domain to the exclusions list (within the extended → network settings) that this prevents it from injecting the payload.
Lighthouse results with injected CSS/JS
Lighthouse results without injected CSS/JS
It would be nice to see any changes in this regard.
JavaScript injection breaks website. Adding the website to the exclusion list and safe list does not resolve the problem.
in Kaspersky Anti-Virus
Posted
As a web developer I would like to have this feature too, because It’s odd to get flawed results from 3rd party payload while running performance tests or debugging/profiling.
KIS is even injecting its CSS/JS into websites that are running on localhost with no possibility to exlude a certain URL from this behaviour. The current workaround is to disable the injection completely, explicitely blocking the URLs within the dev-tools/when running Lighthouse CLI or by running the web server on a port that isn’t monitored.
As a user I would expect that if I add the domain to the exclusions list (within the extended → network settings) that this prevents it from injecting the payload.
It would be nice to see any changes in this regard.