![]() btoa expects a string argument, so when passing it the ArrayBuffer object returned by getRandomBytes(), it's converted to a string by calling .toString() on it. This always results in "[object ArrayBuffer]", effectively resulting in a completely non-random password. |
||
---|---|---|
.. | ||
api.js | ||
background.js | ||
fake_api.js | ||
helpers.js | ||
options.js | ||
popup.js | ||
test.js |