Weekly github digest (WebAppSec specs)

Issues
------
* w3c/webappsec-csp (+1/-0/💬4)
  1 issues created:
  - `service-worker-src` directive (by bakkot)
    https://github.com/w3c/webappsec-csp/issues/638 

  2 issues received 4 new comments:
  - #634 Chrome/Safari trim nonces (1 by evilpie)
    https://github.com/w3c/webappsec-csp/issues/634 
  - #633 Resource hint blocking / "least restrictive" as specified does nothing? (3 by antosart, noamr)
    https://github.com/w3c/webappsec-csp/issues/633 

* w3c/permissions (+1/-0/💬1)
  1 issues created:
  - WebDriver: Should Set Permission apply to future browsing contexts? (by OrKoN)
    https://github.com/w3c/permissions/issues/437 

  1 issues received 1 new comments:
  - #419 WebDriver: Make it possible to pass a different origin to "Set Permission" (1 by miketaylr)
    https://github.com/w3c/permissions/issues/419 

* w3c/webappsec-permissions-policy (+1/-1/💬0)
  1 issues created:
  - methiyaowala (by Usermsn)
    https://github.com/w3c/webappsec-permissions-policy/issues/535 

  1 issues closed:
  - methiyaowala https://github.com/w3c/webappsec-permissions-policy/issues/535 

* w3c/webappsec-trusted-types (+0/-14/💬68)
  18 issues received 68 new comments:
  - #401 Is the `[[ScriptURL]]` slot needed? (1 by koto)
    https://github.com/w3c/trusted-types/issues/401 [proposed-removal] 
  - #399 Is there agreement in the HTML-spec community that no new injection sinks will be added? (1 by lukewarlow)
    https://github.com/w3c/trusted-types/issues/399 
  - #398 Defer `fromLiteral`? (22 by Sora2455, caridy, koto, lukewarlow, mbrodesser-Igalia)
    https://github.com/w3c/trusted-types/issues/398 [proposed-removal] 
  - #397 Defer integration with Dynamic Code Brand Checks? (1 by lukewarlow)
    https://github.com/w3c/trusted-types/issues/397 
  - #393 Incorrect assertion within Example 18 (2 by koto, lukewarlow)
    https://github.com/w3c/trusted-types/issues/393 
  - #386 Are `TrustedTypePolicy`'s `create*` methods intentionally not `readonly`? (5 by mbrodesser-Igalia, smaug----)
    https://github.com/w3c/trusted-types/issues/386 
  - #385 Are all injection sinks covered by the spec? (9 by annevk, lukewarlow, mbrodesser-Igalia)
    https://github.com/w3c/trusted-types/issues/385 
  - #384 Are `getAttributeType` and `getPropertyType` methods neccessary? (1 by lukewarlow)
    https://github.com/w3c/trusted-types/issues/384 
  - #380 TrustedTypes bypass using iframes (1 by koto)
    https://github.com/w3c/trusted-types/issues/380 
  - #379 should `null` & `undefined` for sinks requiring TT be a passthrough ? (2 by koto, lukewarlow)
    https://github.com/w3c/trusted-types/issues/379 
  - #360 Can we conditionally enforce Trusted Types based on document response type in XHR? (3 by annevk, koto)
    https://github.com/w3c/trusted-types/issues/360 [spec] [security] 
  - #359 Maybe enforce Trusted Types in XSL's xsl:text (1 by annevk)
    https://github.com/w3c/trusted-types/issues/359 
  - #357 Add SVG <use> href attribute to Trusted Types enforcement (4 by koto, mozfreddyb, shhnjk)
    https://github.com/w3c/trusted-types/issues/357 
  - #342 CfC to publish as an FPWD. (1 by lukewarlow)
    https://github.com/w3c/trusted-types/issues/342 
  - #305 Maybe remove plugin enforcement from Trusted Types? (4 by annevk, koto)
    https://github.com/w3c/trusted-types/issues/305 [future] 
  - #288 Consider enforcing TT for custom attributes. (1 by koto)
    https://github.com/w3c/trusted-types/issues/288 [future] 
  - #223 Handle innerHTML of svg in IE (1 by lukewarlow)
    https://github.com/w3c/trusted-types/issues/223 [polyfill] 
  - #207 Finalize the integrations that guard eval & Function.constructor (8 by koto, lukewarlow, mbrodesser-Igalia)
    https://github.com/w3c/trusted-types/issues/207 [tc39] 

  14 issues closed:
  - TrustedTypes bypass using iframes https://github.com/w3c/trusted-types/issues/380 
  - Consider enforcing TT for custom attributes. https://github.com/w3c/trusted-types/issues/288 [future] 
  - Consider adding a type for base.href https://github.com/w3c/trusted-types/issues/172 [polyfill] [spec] [future] 
  - Expose information on status of TrustedTypes enforcement https://github.com/w3c/trusted-types/issues/36 [spec] [future] 
  - Maybe remove plugin enforcement from Trusted Types? https://github.com/w3c/trusted-types/issues/305 [future] 
  - 'Create a Trusted Type' algorithm returns error value in step 6  https://github.com/w3c/trusted-types/issues/382 
  - Incorrect assertion within Example 18 https://github.com/w3c/trusted-types/issues/393 
  - Add SVG <use> href attribute to Trusted Types enforcement https://github.com/w3c/trusted-types/issues/357 
  - Are `TrustedTypePolicy`'s `create*` methods intentionally not `readonly`? https://github.com/w3c/trusted-types/issues/386 
  - Missing integration with new unsafe HTML parsing methods https://github.com/w3c/trusted-types/issues/403 
  - Should `require-trusted-types-for` support trusted scripts and trusted script URLs? https://github.com/w3c/trusted-types/issues/383 
  - Defer integration with Dynamic Code Brand Checks? https://github.com/w3c/trusted-types/issues/397 
  - Handle innerHTML of svg in IE https://github.com/w3c/trusted-types/issues/223 [polyfill] 
  - CfC to publish as an FPWD. https://github.com/w3c/trusted-types/issues/342 



Pull requests
-------------
* w3c/webappsec (+1/-1/💬0)
  1 pull requests submitted:
  - Comments from PING on charter 2024 (by plehegar)
    https://github.com/w3c/webappsec/pull/640 

  1 pull requests merged:
  - Comments from PING on charter 2024
    https://github.com/w3c/webappsec/pull/640 

* w3c/webappsec-csp (+1/-0/💬0)
  1 pull requests submitted:
  - Resource hint: check directives explicitly (by noamr)
    https://github.com/w3c/webappsec-csp/pull/637 

* w3c/permissions (+0/-1/💬1)
  1 pull requests received 1 new comments:
  - #436 Require an explicit origin for WebDriver BiDi automation (1 by miketaylr)
    https://github.com/w3c/permissions/pull/436 

  1 pull requests merged:
  - Require an explicit origin for WebDriver BiDi automation
    https://github.com/w3c/permissions/pull/436 

* w3c/webappsec-trusted-types (+6/-6/💬7)
  6 pull requests submitted:
  - Changed incorrect error mention in Create a Trusted Type algorithm. (by koto)
    https://github.com/w3c/trusted-types/pull/410 
  - Added a comment about fromLiteral. (by koto)
    https://github.com/w3c/trusted-types/pull/409 
  - Add goal for transitioning websites to save states (by mbrodesser-Igalia)
    https://github.com/w3c/trusted-types/pull/408 
  - Merged HTML parsing sinks with DOM XSS sinks. (by koto)
    https://github.com/w3c/trusted-types/pull/407 
  - Add integration with setHTMLUnsafe and parseHTMLUnsafe (by lukewarlow)
    https://github.com/w3c/trusted-types/pull/406 
  - Remove `fromLiteral` from spec. (by lukewarlow)
    https://github.com/w3c/trusted-types/pull/405 

  4 pull requests received 7 new comments:
  - #407 Merged HTML parsing sinks with DOM XSS sinks. (1 by koto)
    https://github.com/w3c/trusted-types/pull/407 
  - #406 Add integration with setHTMLUnsafe and parseHTMLUnsafe (3 by lukewarlow, mbrodesser-Igalia)
    https://github.com/w3c/trusted-types/pull/406 
  - #405 Remove `fromLiteral` from spec. (2 by lukewarlow)
    https://github.com/w3c/trusted-types/pull/405 
  - #377 Add detail about fromLiteral to explainer. (1 by lukewarlow)
    https://github.com/w3c/trusted-types/pull/377 

  6 pull requests merged:
  - Add use case for safely transitioning websites to not use any DOM XSS injection sinks
    https://github.com/w3c/trusted-types/pull/408 
  - Changed incorrect error mention in Create a Trusted Type algorithm.
    https://github.com/w3c/trusted-types/pull/410 
  - Added a comment about fromLiteral.
    https://github.com/w3c/trusted-types/pull/409 
  - Add integration with setHTMLUnsafe and parseHTMLUnsafe
    https://github.com/w3c/trusted-types/pull/406 
  - Merged HTML parsing sinks with DOM XSS sinks.
    https://github.com/w3c/trusted-types/pull/407 
  - docs: Include repository field in package.json
    https://github.com/w3c/trusted-types/pull/371 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/w3c/webappsec
* https://github.com/w3c/webappsec-subresource-integrity
* https://github.com/w3c/webappsec-csp
* https://github.com/w3c/webappsec-mixed-content
* https://github.com/w3c/webappsec-upgrade-insecure-requests
* https://github.com/w3c/webappsec-credential-management
* https://github.com/w3c/permissions
* https://github.com/w3c/permissions-registry
* https://github.com/w3c/webappsec-referrer-policy
* https://github.com/w3c/webappsec-secure-contexts
* https://github.com/w3c/webappsec-clear-site-data
* https://github.com/w3c/webappsec-cowl
* https://github.com/w3c/webappsec-epr
* https://github.com/w3c/webappsec-suborigins
* https://github.com/w3c/webappsec-cspee
* https://github.com/w3c/webappsec-permissions-policy
* https://github.com/w3c/webappsec-fetch-metadata
* https://github.com/w3c/webappsec-trusted-types
* https://github.com/w3c/webappsec-change-password-url
* https://github.com/w3c/webappsec-post-spectre-webdev


-- 
Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config

Received on Monday, 22 January 2024 17:00:36 UTC