This demonstrates how the stolen API credentials can be used to clone
Purolator's webchat functionality.
⚠️ Security Research Tool
This is a proof-of-concept demonstrating the vulnerability of
hardcoded API credentials. The credentials extracted from Purolator's
JavaScript have been used to recreate their webchat interface.