Here is a screen:

Is this an internal NoScript object, or an incomplete entry, or something not safe? Should I allow it or forbid it? (This is at Raxco.com [PerfectDisk Defragmenter], on their credit card check-out page.)
Thanks!

Thanks for the quick reply!Giorgio Maone wrote:It's very likely a broken <script> element.
It's basically an invalid entry. It will probably make no difference whether you allow it, since you probably don't have an entry related to this in your hosts file and your DNS server will probably (or should at least) issue a domain-not-found response for this (since there is no such domain on the internet).poee wrote:Does that mean it is unsafe to allow?
No, it would just allow content from "https://script", e.g. if you had a SSL/TLS-enabled webserver running on your network and an entry in your hosts file mapping the domain "script" to the IP of the webserver then it would allow every script transported using HTTPS from that domain, not more, not less.poee wrote:Will allowing it also allow all domains that start with "https://scripts" regardless of TLD?
Well, it's possibly a valid request, e.g. in the local webserver example I just mentioned. But since RP/NS block access to it before even the hostname is resolved they can't know whether allowing it would lead to a successful request/script inclusion.Tom T. wrote:FWIW, when I duplicated OP's permissions, but not allowing https/scripts, RequestPolicy did indeed show a request to "scripts". (or with full addresses enabled in RP, to "https://scripts") Very strange.
Some bad person who sees this thread (possibly reprinted eslewhere) may set up such a domain name, containing malicious script, of course. So I'd still not allow it, But I'd report it to the webmaster of the site.dhouwn wrote:It's basically an invalid entry. It will probably make no difference whether you allow it, since you probably don't have an entry related to this in your hosts file and your DNS server will probably (or should at least) issue a domain-not-found response for this (since there is no such domain on the internet).poee wrote:Does that mean it is unsafe to allow?No, it would just allow content from "https://script", e.g. if you had a SSL/TLS-enabled webserver running on your network and an entry in your hosts file mapping the domain "script" to the IP of the webserver then it would allow every script transported using HTTPS from that domain, not more, not less.poee wrote:Will allowing it also allow all domains that start with "https://scripts" regardless of TLD?Well, it's possibly a valid request, e.g. in the local webserver example I just mentioned. But since RP/NS block access to it before even the hostname is resolved they can't know whether allowing it would lead to a successful request/script inclusion.Tom T. wrote:FWIW, when I duplicated OP's permissions, but not allowing https/scripts, RequestPolicy did indeed show a request to "scripts". (or with full addresses enabled in RP, to "https://scripts") Very strange.