Is there any way to disable such "hardcore" blocking?
I couldn't find anything related in the web security module's settings, i attached a screenshot of my current settings (sorry i use the german version)
Edit: @ DavidR the dialog/popup looked different for me, there was no way to reprot as false positive or choose what to do?
1. I don't believe this is hard core blocking, how is an AV to determine what is an example of the code and what is the real McCoy. The only way to block it (disable the web shield) would leave your system very vulnerable. Avast makes no concession of whose site it might be and it doesn't really check that (they could get hacked/infected too) and it is hardly a competitor as many use MBAM and avast and MBAM isn't an antivirus.
Personally for a security based site I believe malwarebytes should have posted images of the script rather than text examples of it, which could trigger alerts, not only by avast.
Can you edit your original link - change the https to hXXps - so that it isn't active, avoiding accidental exposure to it.
2. Short of what I said above - The only thing in the web shield would be setting an exclusion, but that would be somewhat pointless as you can only do that retrospectively.
3. I have my settings on the Web Shied - Actions, first option set to Ask - I don't know if that would change the dialogue window, but it does give the option to report as a false positive. However, the end result would be to abort the connection as there are no other options after the ASK window appears, it just gives me time to capture stuff.