chore(sentry): silence Opera extension injection noise (WORLDMONITOR-NS/NT/NV)

Three cascading errors fired within ~40 ms from a single Opera 130 /
Windows 10 session — all signatures of an extension injecting broken
JS:

- `oîUpdateObj` contains a non-ASCII `î`; our minifier only emits ASCII.
- `Octal literals are not allowed in strict mode` — our TS bundle never
  uses octals and never runs eval.
- `Unexpected identifier 'm'` — a pre-compiled bundle cannot parse-fail
  at runtime, so this is foreign `<script>` evaluation.

Add three narrowly-scoped `ignoreErrors` patterns (the non-ASCII
property-name one is specifically gated on the `reading '…'` shape so
genuine first-party property accesses remain visible).
This commit is contained in:
Elie Habib
2026-04-23 06:50:54 +04:00
parent 7cf37c604c
commit 024d8ff1a1

View File

@@ -262,6 +262,9 @@ Sentry.init({
/\[CONVEX [AQM]\(.+?\)\] Connection lost while action was in flight/, // Convex SDK transient WS disconnect
/Response did not contain `success` or `data`/, // DuckDuckGo browser internal tracker/content-block response — never emitted by our code
/Cannot set properties of undefined \(setting 'bodyTouched'\)/, // Quark browser (Alibaba mobile) touch-tracking script injection (WORLDMONITOR-N1)
/Cannot read properties of \w+ \(reading '[^']*[^\x00-\x7F][^']*'\)/, // Non-ASCII property name in message = mojibake/corrupted identifier from injected extension; our bundle emits ASCII-only identifiers (WORLDMONITOR-NS)
/Octal literals are not allowed in strict mode/, // Runtime SyntaxError from injected extension script; our TS bundle never emits octal literals and doesn't eval (WORLDMONITOR-NV)
/Unexpected identifier 'm'/, // Foreign script injection on Opera; pre-compiled bundle can't parse-fail at runtime (WORLDMONITOR-NT)
],
beforeSend(event) {
const msg = event.exception?.values?.[0]?.value ?? '';