I'm trying to debug what data is sent by firefox to google's safe browsing APIs.
So far, I was able to tap into the request sent, which looks something like:
https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=AIzaSyC7jsptDS3am4tPx4r3nxis7IMjBc5Dovo&$httpMethod=POST&$req=ChUKE25hdmNsaWVudC1hdXRvLWZmb3gaJwgFEAQaGwoNCAUQBhgBIgMwMDEwARCk1QkaAhgKsy218SICIAIoARonCAEQBBobCg0IARAGGAEiAzAwMTABENeOCBoCGAr-a4NBIgIgAigBGicIAxAEGhsKDQgDEAYYASIDMDAxMAEQ_JYIGgIYCtVt0KUiAiACKAEaJwgHEAQaGwoNCAcQBhgBIgMwMDEwARDcuAgaAhgKOQYHqCICIAIoARolCAkQBBoZCg0ICRAGGAEiAzAwMTABEB8aAhgKNd1EeSICIAIoAQ==
or
https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=AIzaSyC7jsptDS3am4tPx4r3nxis7IMjBc5Dovo&$httpMethod=POST&$req=ChUKE25hdmNsaWVudC1hdXRvLWZmb3gSGwoNCAUQBhgBIgMwMDEwARCq1QkaAhgGlctYrBouCAUQBBoGCgTnIr_kGgYKBDB7AsgaBgoEcj_bPBoGCgScmzMmGgYKBMkwXGMgAQ==
How do i figure out what the plain text payload is?
So far using the stacktrace it looks like the payload is encoded using
https://searchfox.org/mozilla-central/source/toolkit/components/url-classifier/UrlClassifierListManager.jsm#591