diff --git a/IPython/html/tests/casperjs/test_cases/inject_js.js b/IPython/html/tests/casperjs/test_cases/inject_js.js new file mode 100644 index 0000000..805ab83 --- /dev/null +++ b/IPython/html/tests/casperjs/test_cases/inject_js.js @@ -0,0 +1,23 @@ +// +// Test robustness about JS injection in different place +// +// This assume malicious document arrive to the frontend. +// + +casper.notebook_test(function () { + var messages = []; + this.on('remote.alert', function (msg) { + messages.push(msg); + }); + + this.evaluate(function () { + var cell = IPython.notebook.get_cell(0); + var json = cell.toJSON() + json.prompt_number = "" + cell.fromJSON(j) + }); + + this.then(function () { + this.test.assert(messages.length == 0, "Captured log message from script tag injection !"); + }); +});