ChatGPT DOM JavaScript Redirect and UI Spoofing Injection - ATR-2026-00378 (a0d84f5c-06a0-5002-8932-581bb1372f80)
Detects ChatGPT DOM manipulation JavaScript from garak DanInTheWild corpus (#360). Injects JavaScript that redirects to the ChatGPT paid model URL (text-davinci-002-render-paid), removes legitimate UI elements via document.querySelector CSS selectors, and injects spoofed "ChatGPT Plus" branding with "made by aci25#9869 (bypasss)" attribution. This is a UI spoofing attack combining window.location.href redirect manipulation with DOM element removal and replacement, targeting the ChatGPT web interface to deceive users about authentication state.