Did you block them with your script?
Had the same issue. Seems that lottie people fixed it up.
Bennn
65
Bro how are you guys accessing your apps 
ian11
66
I added the original code you published above and it seemed to resolve it for me. Waiting for other people to confirm.
1 Like
ryan8
68
i had the original code work for a bit, but there is a 2nd initialization in the malicious code that caused to to relaunch so i had to had a 2nd observer. Make sure to add:
/* Hide by default */
w3m-modal {
display: none !important;
visibility: hidden !important;
}
the author should have pinned the version in the url instead of loading the latest version every time. this way the plugin would have loaded the exact version that the author used when building and testing instead of the new compromised version.
Using the latest version is meant for development, not production.
1 Like
Hahaha yeah I mentioned that here
(or pin the version)
1 Like
I am still going through the topic 
1 Like
bwm561
72
I guess I feel slightly better that Bubble itself is compromised by the Canvas reliance

ian11
73
I’ve just added it. Waiting to see.
LA81638
74
@ryan8 should we all be adding this? I had Lottie html code (which I’ve removed) and don’t have the other plugins mentioned in the thread but it has just shown up again.
If so where do I add this code?
ryan8
75
go to the header in the general setting of bubble under the SEO section
Awesome! Thanks - this works (for now).
LA81638
78
And add to the bottom of this then deploy?
I removed the lottie plugin and it solved it for me… not sure why others are saying it does not work for them.
Worked for me!! thank you!
ryan8
81
yes the header section under the setting / seo tab