Deep coverage of novel and obscure egress/exfil channels not covered by other
suites. This suite targets channels that are frequently missed by WebView URL
filters: DNS-over-HTTPS tunnelling, CSS Houdini worklet loads, XSLT external
document(), import map URL overrides, javascript: URI execution,
alternative-origin blob/data iframe escapes, URL parser confusion attacks,
device APIs (USB/BT/Serial/NFC), Web Share, Clipboard, Reporting, and
timing/cache side-channel oracles (reconnaissance-without-request attacks).
Two classes of threat:
(1) Exfil — data leaves the process to an external endpoint.
(2) Covert/oracle — the page learns information about the filter's
allow list without making a "blocked" outbound request.