Weekly github digest (WebAppSec specs)

Issues
------
* w3c/permissions (+1/-0/💬3)
  1 issues created:
  - Script origin bound permissions (by nuxodin)
    https://github.com/w3c/permissions/issues/211 

  2 issues received 3 new comments:
  - #211 Script origin bound permissions (2 by clelland, nuxodin)
    https://github.com/w3c/permissions/issues/211 
  - #210 Add "popups" permission type (1 by samuelmaddock)
    https://github.com/w3c/permissions/issues/210 

* w3c/webappsec-referrer-policy (+2/-3/💬6)
  2 issues created:
  - Ability to prevent tabnabbing with the referrer-policy header (by ConradIrwin)
    https://github.com/w3c/webappsec-referrer-policy/issues/141 
  - Strip url check for null url appears redundant (by gterzian)
    https://github.com/w3c/webappsec-referrer-policy/issues/139 

  4 issues received 6 new comments:
  - #141 Ability to prevent tabnabbing with the referrer-policy header (3 by ConradIrwin, annevk)
    https://github.com/w3c/webappsec-referrer-policy/issues/141 
  - #139 Strip url check for null url appears redundant (1 by domfarolino)
    https://github.com/w3c/webappsec-referrer-policy/issues/139 
  - #138 Parameterised Referrer Policy (1 by domfarolino)
    https://github.com/w3c/webappsec-referrer-policy/issues/138 
  - #134 Drop mentions of HTML5 (1 by domfarolino)
    https://github.com/w3c/webappsec-referrer-policy/issues/134 

  3 issues closed:
  - Ability to prevent tabnabbing with the referrer-policy header https://github.com/w3c/webappsec-referrer-policy/issues/141 
  - Drop mentions of HTML5 https://github.com/w3c/webappsec-referrer-policy/issues/134 
  - Parameterised Referrer Policy https://github.com/w3c/webappsec-referrer-policy/issues/138 

* w3c/webappsec-secure-contexts (+0/-3/💬3)
  3 issues received 3 new comments:
  - #74 secure contexts and Workers created from data URLs (1 by annevk)
    https://github.com/w3c/webappsec-secure-contexts/issues/74 
  - #57 "Is an environment settings object contextually secure?" does not work for worklets (1 by annevk)
    https://github.com/w3c/webappsec-secure-contexts/issues/57 
  - #56 "Is an environment settings object contextually secure?" does not deal with nested workers (1 by annevk)
    https://github.com/w3c/webappsec-secure-contexts/issues/56 

  3 issues closed:
  - "Is an environment settings object contextually secure?" does not work for worklets https://github.com/w3c/webappsec-secure-contexts/issues/57 
  - secure contexts and Workers created from data URLs https://github.com/w3c/webappsec-secure-contexts/issues/74 
  - "Is an environment settings object contextually secure?" does not deal with nested workers https://github.com/w3c/webappsec-secure-contexts/issues/56 

* w3c/webappsec-feature-policy (+0/-0/💬2)
  1 issues received 2 new comments:
  - #381 Remove '*' default allowlist (2 by annevk, yoavweiss)
    https://github.com/w3c/webappsec-feature-policy/issues/381 

* w3c/webappsec-fetch-metadata (+1/-0/💬0)
  1 issues created:
  - Fetch integration (by annevk)
    https://github.com/w3c/webappsec-fetch-metadata/issues/58 

* WICG/trusted-types (+1/-0/💬3)
  1 issues created:
  - Operations must not be overloaded across interface, partial interface, etc. (by foolip)
    https://github.com/w3c/webappsec-trusted-types/issues/283 

  2 issues received 3 new comments:
  - #278 Make input argument to createHTML, createScript, and createScriptURL optional (1 by shhnjk)
    https://github.com/w3c/webappsec-trusted-types/issues/278 
  - #256 require-trusted-types-for 'wasm' (2 by binji, koto)
    https://github.com/w3c/webappsec-trusted-types/issues/256 [future] [spec] 



Pull requests
-------------
* w3c/webappsec-csp (+0/-0/💬2)
  1 pull requests received 2 new comments:
  - #293 Minimal specification of 'wasm-eval' source directive (2 by annevk, binji)
    https://github.com/w3c/webappsec-csp/pull/293 

* w3c/webappsec-referrer-policy (+1/-1/💬0)
  1 pull requests submitted:
  - Remove HTML5 note (by domfarolino)
    https://github.com/w3c/webappsec-referrer-policy/pull/140 

  1 pull requests merged:
  - Remove HTML5 note
    https://github.com/w3c/webappsec-referrer-policy/pull/140 

* w3c/webappsec-cspee (+1/-0/💬0)
  1 pull requests submitted:
  - Fix examples involving wildcard host matching. (by antosart)
    https://github.com/w3c/webappsec-cspee/pull/13 

* WICG/trusted-types (+1/-0/💬1)
  1 pull requests submitted:
  - Fix invalid Web IDL syntax (by foolip)
    https://github.com/w3c/webappsec-trusted-types/pull/282 

  1 pull requests received 1 new comments:
  - #282 Fix invalid Web IDL syntax (1 by foolip)
    https://github.com/w3c/webappsec-trusted-types/pull/282 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/w3c/webappsec
* https://github.com/w3c/webappsec-subresource-integrity
* https://github.com/w3c/webappsec-csp
* https://github.com/w3c/webappsec-mixed-content
* https://github.com/w3c/webappsec-upgrade-insecure-requests
* https://github.com/w3c/webappsec-credential-management
* https://github.com/w3c/permissions
* https://github.com/w3c/webappsec-referrer-policy
* https://github.com/w3c/webappsec-secure-contexts
* https://github.com/w3c/webappsec-clear-site-data
* https://github.com/w3c/webappsec-cowl
* https://github.com/w3c/webappsec-epr
* https://github.com/w3c/webappsec-suborigins
* https://github.com/w3c/webappsec-cspee
* https://github.com/w3c/webappsec-feature-policy
* https://github.com/w3c/webappsec-fetch-metadata
* https://github.com/WICG/trusted-types
* https://github.com/w3c/webappsec-unofficial-drafts

Received on Monday, 6 July 2020 17:00:15 UTC