- From: W3C Webmaster via GitHub API <sysbot+gh@w3.org>
- Date: Mon, 06 Jul 2020 17:00:13 +0000
- To: public-webappsec@w3.org
- Message-Id: <E1jsUTV-0006zi-Lc@uranus.w3.org>
Issues
------
* w3c/permissions (+1/-0/💬3)
1 issues created:
- Script origin bound permissions (by nuxodin)
https://github.com/w3c/permissions/issues/211
2 issues received 3 new comments:
- #211 Script origin bound permissions (2 by clelland, nuxodin)
https://github.com/w3c/permissions/issues/211
- #210 Add "popups" permission type (1 by samuelmaddock)
https://github.com/w3c/permissions/issues/210
* w3c/webappsec-referrer-policy (+2/-3/💬6)
2 issues created:
- Ability to prevent tabnabbing with the referrer-policy header (by ConradIrwin)
https://github.com/w3c/webappsec-referrer-policy/issues/141
- Strip url check for null url appears redundant (by gterzian)
https://github.com/w3c/webappsec-referrer-policy/issues/139
4 issues received 6 new comments:
- #141 Ability to prevent tabnabbing with the referrer-policy header (3 by ConradIrwin, annevk)
https://github.com/w3c/webappsec-referrer-policy/issues/141
- #139 Strip url check for null url appears redundant (1 by domfarolino)
https://github.com/w3c/webappsec-referrer-policy/issues/139
- #138 Parameterised Referrer Policy (1 by domfarolino)
https://github.com/w3c/webappsec-referrer-policy/issues/138
- #134 Drop mentions of HTML5 (1 by domfarolino)
https://github.com/w3c/webappsec-referrer-policy/issues/134
3 issues closed:
- Ability to prevent tabnabbing with the referrer-policy header https://github.com/w3c/webappsec-referrer-policy/issues/141
- Drop mentions of HTML5 https://github.com/w3c/webappsec-referrer-policy/issues/134
- Parameterised Referrer Policy https://github.com/w3c/webappsec-referrer-policy/issues/138
* w3c/webappsec-secure-contexts (+0/-3/💬3)
3 issues received 3 new comments:
- #74 secure contexts and Workers created from data URLs (1 by annevk)
https://github.com/w3c/webappsec-secure-contexts/issues/74
- #57 "Is an environment settings object contextually secure?" does not work for worklets (1 by annevk)
https://github.com/w3c/webappsec-secure-contexts/issues/57
- #56 "Is an environment settings object contextually secure?" does not deal with nested workers (1 by annevk)
https://github.com/w3c/webappsec-secure-contexts/issues/56
3 issues closed:
- "Is an environment settings object contextually secure?" does not work for worklets https://github.com/w3c/webappsec-secure-contexts/issues/57
- secure contexts and Workers created from data URLs https://github.com/w3c/webappsec-secure-contexts/issues/74
- "Is an environment settings object contextually secure?" does not deal with nested workers https://github.com/w3c/webappsec-secure-contexts/issues/56
* w3c/webappsec-feature-policy (+0/-0/💬2)
1 issues received 2 new comments:
- #381 Remove '*' default allowlist (2 by annevk, yoavweiss)
https://github.com/w3c/webappsec-feature-policy/issues/381
* w3c/webappsec-fetch-metadata (+1/-0/💬0)
1 issues created:
- Fetch integration (by annevk)
https://github.com/w3c/webappsec-fetch-metadata/issues/58
* WICG/trusted-types (+1/-0/💬3)
1 issues created:
- Operations must not be overloaded across interface, partial interface, etc. (by foolip)
https://github.com/w3c/webappsec-trusted-types/issues/283
2 issues received 3 new comments:
- #278 Make input argument to createHTML, createScript, and createScriptURL optional (1 by shhnjk)
https://github.com/w3c/webappsec-trusted-types/issues/278
- #256 require-trusted-types-for 'wasm' (2 by binji, koto)
https://github.com/w3c/webappsec-trusted-types/issues/256 [future] [spec]
Pull requests
-------------
* w3c/webappsec-csp (+0/-0/💬2)
1 pull requests received 2 new comments:
- #293 Minimal specification of 'wasm-eval' source directive (2 by annevk, binji)
https://github.com/w3c/webappsec-csp/pull/293
* w3c/webappsec-referrer-policy (+1/-1/💬0)
1 pull requests submitted:
- Remove HTML5 note (by domfarolino)
https://github.com/w3c/webappsec-referrer-policy/pull/140
1 pull requests merged:
- Remove HTML5 note
https://github.com/w3c/webappsec-referrer-policy/pull/140
* w3c/webappsec-cspee (+1/-0/💬0)
1 pull requests submitted:
- Fix examples involving wildcard host matching. (by antosart)
https://github.com/w3c/webappsec-cspee/pull/13
* WICG/trusted-types (+1/-0/💬1)
1 pull requests submitted:
- Fix invalid Web IDL syntax (by foolip)
https://github.com/w3c/webappsec-trusted-types/pull/282
1 pull requests received 1 new comments:
- #282 Fix invalid Web IDL syntax (1 by foolip)
https://github.com/w3c/webappsec-trusted-types/pull/282
Repositories tracked by this digest:
-----------------------------------
* https://github.com/w3c/webappsec
* https://github.com/w3c/webappsec-subresource-integrity
* https://github.com/w3c/webappsec-csp
* https://github.com/w3c/webappsec-mixed-content
* https://github.com/w3c/webappsec-upgrade-insecure-requests
* https://github.com/w3c/webappsec-credential-management
* https://github.com/w3c/permissions
* https://github.com/w3c/webappsec-referrer-policy
* https://github.com/w3c/webappsec-secure-contexts
* https://github.com/w3c/webappsec-clear-site-data
* https://github.com/w3c/webappsec-cowl
* https://github.com/w3c/webappsec-epr
* https://github.com/w3c/webappsec-suborigins
* https://github.com/w3c/webappsec-cspee
* https://github.com/w3c/webappsec-feature-policy
* https://github.com/w3c/webappsec-fetch-metadata
* https://github.com/WICG/trusted-types
* https://github.com/w3c/webappsec-unofficial-drafts
Received on Monday, 6 July 2020 17:00:15 UTC