We have just received an email from our Google Ads account and they say that our landing pages are running a script/code which is compromised.The code causing these redirects seems to be coming from a few different third-party web resource providers including Polyfill.io, Bootcss.com, Bootcdn.net, or Staticfile.org. Similar reports can be found by searching for "polyfill.io" on Google (https://www.google.com/search?q=polyfill.io).

We did some investigating into our site and it looks like the polyfill.io code is coming from the Buttonizer activation on our site.

Is there a way to disable this polyfill.io function?

  • Jasper and roy replied to this.
  • Hey stark ,

    Thanks for reaching out to us and sharing your concerns!

    Buttonizer does not include Polyfill.io with our widgets. I've checked your sites and it seems that two of them are using convertbox.com, this one appears to have a script in their embed.js (https://cdn.convertbox.com/convertbox/js/embed.js).

    Are you able to verify that you received the warning for the sites that start with kfz-(..) and deine(...)? Or did you receive that warning for other sites as well where you are using Buttonizer?

    Let me know 🙂


    Update: Confirmed through email, so we can safely mark this as resolved 🙂

    Hey stark ,

    Thanks for reaching out to us and sharing your concerns!

    Buttonizer does not include Polyfill.io with our widgets. I've checked your sites and it seems that two of them are using convertbox.com, this one appears to have a script in their embed.js (https://cdn.convertbox.com/convertbox/js/embed.js).

    Are you able to verify that you received the warning for the sites that start with kfz-(..) and deine(...)? Or did you receive that warning for other sites as well where you are using Buttonizer?

    Let me know 🙂


    Update: Confirmed through email, so we can safely mark this as resolved 🙂

    5 days later