Evil Autofill Traps

Credential fields hidden or visually misrepresented inside an attacker-controlled frame.

Visible decoy + hidden credential form
Covered real inputs
Fake coupon lookup

Visible layer over real credential fields.

Local instrumentation log