Test all security features and bypass attempts
Test basic CAPTCHA functionality with token generation
Try to bypass CAPTCHA by enabling button manually
// Attack code:
document.getElementById('submitBtn').disabled = false;
// Expected: 🚨 Detected and blocked
// Button should be re-disabled automatically
Check if verification token is generated and stored
Try to manipulate localStorage to reset bot attempts
Verify that onComplete receives correct data structure
// Expected callback data:
{
success: true,
token: "eyJzY29yZSI6ODU...",
humanScore: 85,
digits: [1, 2, 3, 4],
metrics: { mouseMovements: 45, ... },
fingerprint: { canvas: "a3f2...", webgl: "..." }
}
Test MutationObserver detection of unauthorized changes
Test if tokens expire after 1 minute (simulated)
Test invisible honeypot trap for bot detection
// Honeypot Strategy: 1. Invisible field auto-focuses (bot doesn't see it) 2. Bot fills focused field → 🚨 INSTANT DETECTION 3. Human uses mouse → clicks real input → ✅ +5 bonus // How it works: - Field is invisible (opacity:0 or position:-9999px) - Auto-focuses after 100ms - Bots fill it without knowing - Humans never see it, use mouse instead
Real-time console output