No, this does not come from our code. I have no idea what makes you think otherwise. There are several reasons why any decent developer wouldn't include arbitrary Amazon S3 links to their product (unless they are trying to hack you, or worse). Also I cannot see this error when I inspect your site on Chrome.
In fact,
a trivial Google search very clearly points out that this is malware included in various Chrome extensions! The two extensions most likely to be the culprits are "Appspector" and "HTTP Headers". It seems like the developer was caught red-handed and his Chrome extensions removed. Therefore he had no use of these JS files any more and he removed them. That's why you get the errors.
So, you installed a Google Chrome extension which contained malware. At the very least it was able to intercept all usernames and passwords you ever typed in the browser. Most likely it would have already exploited zero day attacks against your operating system and install more persistent forms of malware which give hackers control over your computer in far less visible ways. At worst it may have installed an advanced persistent threat ("rootkit") which can even survive a reformatting of the hard drive by contaminating the operating system's recovery partition. At this point you should consider yourself fully hacked in two ways.
First of all
you should assume your web presence is fully hacked. Assume that all your usernames and passwords for all sites you are using (from your own sites to your banks) have been leaked to a hacker. You must change all your passwords to everything you have ever visited from that compromised browser installation. You should do that from a different, clean computer and a different browser. Remember that Chrome auto-installs all extensions to any new installation as soon as you log in with your Google ID. This means that any other device running Chrome you've used is also very likely infected.
Moreover,
you should assume your computer itself thoroughly hacked. I would suggest going for the nuclear option: delete everything, reformat the hard drive and install your operating system afresh from a fresh copy (ideally a read-only medium, such as a CD-ROM). Do not trust the recovery partition of Windows or macOS when you have this kind of valid reasons to believe that you have been infected with malware.
Nicholas K. Dionysopoulos
Lead Developer and Director
🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!