Scripts extracted the PII information leaked in the source code of web pages caused due to Business Logic Flaws, Insecure Design, and Insecure Implementation.
Both scripts were developed as POCs to help understand the impact and how a malicious actor can automate the task of data extraction and data storage through automation.