Daily timeframe is printing a textbook bull-flag continuation. Open the chart in the TradingView app to inspect indicator overlays.
Open chart in TradingView
PoC note: tapping the button (or auto-fire on Android Chrome) dispatches an
ACTION_VIEW intent at com.tradingview.tradingviewapp
with the data URL https://aatradingview.com/chart/?symbol=NASDAQ:AAPL.
The TradingView in-app deep-link regex
^https?://((\w|\d|-)+.)?tradingview\.com/chart/?\?symbol=.+
has an unescaped dot after the word group, so attacker-registered domains
(aatradingview.com, 1ztradingview.com, etc.) pass
the gate and are loaded into the chart WebView. The chart WebView still has
AndroidClipboardManager attached (no
removeJavascriptInterface anywhere in the codebase), so the
page served at /chart/ on this server gets the bridge and runs
silent clipboard read+write.