How this works:
1. You connected to https://satytestattack.xyz via HTTP/2
2. The server sent an ORIGIN frame claiming authority for satytest.xyz
3. Firefox will reuse this connection for satytest.xyz requests
4. The iframe below loads https://satytest.xyz — but this server answers
5. Arbitrary JavaScript executes in the satytest.xyz origin