[Webpage] Report a suspected false positive

Good Day,

Avast Webpage Report a suspected false positive is not working, it shows error no matter what you type (seems captcha problem)
https://www.avast.com/false-positive-file-form.php

Where can we submit support tickets for our false positive website?

Hi, did you try with another browser…?

Yes we checked on:
Microsoft Edge
Chrome
Internet Explorer
Yandex Browser

From different computer same error, captcha seems blocking the submiting form

Well, ReCaptcha is provided by Google, let’s hope it gets fixed soon.

I just used Firefox and got past the I’m not a Robot validation.

Hi Dave, did you send something…!?

See: https://forum.avast.com/index.php?topic=249177.msg1584060#msg1584060

It’s passing for me as well the security check, but after submiting the form it provides the error,

I already reported it, let’s see…

No I didn’t as essentially I had nothing to report. Reporting a site associated with my email address wasn’t something I wanted as it could generate a response from Avast that I couldn’t offer any additional information.

But from the other link it is that 2nd level/submitting that is causing the issue.

The error is still there, seems it will take some time, have a good weekend guys!

https://i.imgur.com/C16EuzL.jpg

Retirable jQuery library: https://retire.insecurity.today/#!/scan/5019d0011f8d97e58845ce5a0ffa693002d42e43c5fbffd8609660c88c61d0e1

See an SRC Quick Source view of that Form page

HTML -www.avast.com/false-positive-file-form.php 104,239 bytes, 1351 nodes

Javascript 21 (external 10, inline 11)
-www.googletagmanager.com/​gtm.js?id=GTM-PZ48F8
INLINE: (function() { // If GPC on, set DOM property to true if not
964 bytes

INLINE: !function(){let e=!1;function n(){if(!e){const n=document.createElement(“meta”);
613 bytes

-cdn.cookielaw.org/consent/b680e9a8-3d45-4e4a-998f-7d05f89e4486/​OtAutoBlock.js
-cdn.cookielaw.org/scripttemplates/​otSDKStub.js
INLINE: function OptanonWrapper() { var cookieBannerContainer = document.getElementBy
159 bytes

INLINE: /*! Declare GTM dataLayer */ window.dataLayer = window.dataLayer || ;
631 bytes

INLINE: (function(a,s,y,n,c,h,i,d,e){s.className+=’ '+y;h.start=1*new Date; h.end=i=func
304 bytes

INLINE: (function(w,d,s,l,i){w[l]=w[l]||;w[l].push({‘gtm.start’: new Date().getTime(),
340 bytes

-static3.avast.com/20001219/web/j/​jquery.js
INLINE: /* * This entire block is wrapped in an IIFE to prevent polluting the scope of
430,883 bytes

INLINE: document.documentElement.className = document.documentElement.classNam
110 bytes

INLINE: !function(a){var e=“-https://s.go-mpulse.net/boomerang/",t="addEventListener”;if(
2,979 bytes

INLINE: var onloadCallback = function(e) { var $elm
663 bytes

-www.google.com/recaptcha/​api.js?onload=onloadCallback&render=explicit&hl=en-ww
INLINE: window.avastGlobals = window.avastGlobals || {}; window.avastGlobals.web = {
5,314 bytes

-static3.avast.com/20001219/web/j/​avast.js
-static3.avast.com/20001219/web/j/lib/createjs/​bundle.js
-static3.avast.com/20001219/web/j/​dtp-overlay-firefox.js
-static.avast.com/​client.js
-static3.avast.com/20001219/web/j/​avastform.js
CSS 10 (external 6, inline 4)
INLINE: .async-hide { opacity: 0 !important}
37 bytes INJECTED

-static3.avast.com/20001219/web/c/​common-web-v12.css
INJECTED

-static3.avast.com/20001219/web/c/​forms.css
INJECTED

-static3.avast.com/20001219/web/c/​forms-padded.css
INJECTED

-static3.avast.com/20001219/web/c/​forms-false-positive-file.css
INJECTED

-static3.avast.com/20001219/web/c/​download-popup.css
INJECTED

-static3.avast.com/20001219/web/c/local/en-ww/​local.css
INJECTED

INLINE: @media print {#ghostery-tracker-tally {display:none !important}}
64 bytes INJECTED

INLINE: .reader-only { position: absolute; left: -99999px;
169 bytes INJECTED

INLINE: #cdac_container { font-family: Arial, sans-serif !important; font-size: 12px !i
1,536 bytes INJECTED

Tips

BeautifyCopy to clipboard
-https://www.avast.com/false-positive-file-form.php

<script data-dapp-detection="">
    ! function() {
        let e = !1;

        function n() {
            if (!e) {
                const n = document.createElement("meta");
                n.name = "dapp-detected", document.head.appendChild(n), e = !0
            }
        }
        if (window.hasOwnProperty("ethereum")) {
            if (window.__disableDappDetectionInsertion = !0, void 0 === window.ethereum) return;
            n()
        } else {
            var t = window.ethereum;
            Object.defineProperty(window, "ethereum", {
                        configurable: !0,
                        enumerable: !1,
                        set: function(e) {
                                window.__disableDappDetection truncated 613 bytes...
</script>
<script type="text/javascript" src="-https://cdn.cookielaw.org/consent/b680e9a8-3d45-4e4a-998f-7d05f89e4486/OtAutoBlock.js"></script>
<script src="-https://cdn.cookielaw.org/scripttemplates/otSDKStub.js" data-document-language="true" type="text/javascript" charset="UTF-8" data-domain-script="b680e9a8-3d45-4e4a-998f-7d05f89e4486"></script>
<script type="text/javascript">
    function OptanonWrapper() {
        var cookieBannerContainer = document.getElementById("onetrust-consent-sdk");
        document.body.prepend(cookieBannerContainer);
    }
</script>

<meta charset="utf-8">

<script>
    /*! Declare GTM dataLayer */
    window.dataLayer = window.dataLayer || [];

    /*! Dimensions to dataLayer */</blockquote> 

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)

Note, the form should be fixed now.

Yes it’s working now!

Thank you :wink:

You’re welcome. :slight_smile: