- From: W3C Webmaster via GitHub API <sysbot+gh@w3.org>
- Date: Mon, 06 Jul 2020 17:00:13 +0000
- To: public-webappsec@w3.org
- Message-Id: <E1jsUTV-0006zi-Lc@uranus.w3.org>
Issues ------ * w3c/permissions (+1/-0/💬3) 1 issues created: - Script origin bound permissions (by nuxodin) https://github.com/w3c/permissions/issues/211 2 issues received 3 new comments: - #211 Script origin bound permissions (2 by clelland, nuxodin) https://github.com/w3c/permissions/issues/211 - #210 Add "popups" permission type (1 by samuelmaddock) https://github.com/w3c/permissions/issues/210 * w3c/webappsec-referrer-policy (+2/-3/💬6) 2 issues created: - Ability to prevent tabnabbing with the referrer-policy header (by ConradIrwin) https://github.com/w3c/webappsec-referrer-policy/issues/141 - Strip url check for null url appears redundant (by gterzian) https://github.com/w3c/webappsec-referrer-policy/issues/139 4 issues received 6 new comments: - #141 Ability to prevent tabnabbing with the referrer-policy header (3 by ConradIrwin, annevk) https://github.com/w3c/webappsec-referrer-policy/issues/141 - #139 Strip url check for null url appears redundant (1 by domfarolino) https://github.com/w3c/webappsec-referrer-policy/issues/139 - #138 Parameterised Referrer Policy (1 by domfarolino) https://github.com/w3c/webappsec-referrer-policy/issues/138 - #134 Drop mentions of HTML5 (1 by domfarolino) https://github.com/w3c/webappsec-referrer-policy/issues/134 3 issues closed: - Ability to prevent tabnabbing with the referrer-policy header https://github.com/w3c/webappsec-referrer-policy/issues/141 - Drop mentions of HTML5 https://github.com/w3c/webappsec-referrer-policy/issues/134 - Parameterised Referrer Policy https://github.com/w3c/webappsec-referrer-policy/issues/138 * w3c/webappsec-secure-contexts (+0/-3/💬3) 3 issues received 3 new comments: - #74 secure contexts and Workers created from data URLs (1 by annevk) https://github.com/w3c/webappsec-secure-contexts/issues/74 - #57 "Is an environment settings object contextually secure?" does not work for worklets (1 by annevk) https://github.com/w3c/webappsec-secure-contexts/issues/57 - #56 "Is an environment settings object contextually secure?" does not deal with nested workers (1 by annevk) https://github.com/w3c/webappsec-secure-contexts/issues/56 3 issues closed: - "Is an environment settings object contextually secure?" does not work for worklets https://github.com/w3c/webappsec-secure-contexts/issues/57 - secure contexts and Workers created from data URLs https://github.com/w3c/webappsec-secure-contexts/issues/74 - "Is an environment settings object contextually secure?" does not deal with nested workers https://github.com/w3c/webappsec-secure-contexts/issues/56 * w3c/webappsec-feature-policy (+0/-0/💬2) 1 issues received 2 new comments: - #381 Remove '*' default allowlist (2 by annevk, yoavweiss) https://github.com/w3c/webappsec-feature-policy/issues/381 * w3c/webappsec-fetch-metadata (+1/-0/💬0) 1 issues created: - Fetch integration (by annevk) https://github.com/w3c/webappsec-fetch-metadata/issues/58 * WICG/trusted-types (+1/-0/💬3) 1 issues created: - Operations must not be overloaded across interface, partial interface, etc. (by foolip) https://github.com/w3c/webappsec-trusted-types/issues/283 2 issues received 3 new comments: - #278 Make input argument to createHTML, createScript, and createScriptURL optional (1 by shhnjk) https://github.com/w3c/webappsec-trusted-types/issues/278 - #256 require-trusted-types-for 'wasm' (2 by binji, koto) https://github.com/w3c/webappsec-trusted-types/issues/256 [future] [spec] Pull requests ------------- * w3c/webappsec-csp (+0/-0/💬2) 1 pull requests received 2 new comments: - #293 Minimal specification of 'wasm-eval' source directive (2 by annevk, binji) https://github.com/w3c/webappsec-csp/pull/293 * w3c/webappsec-referrer-policy (+1/-1/💬0) 1 pull requests submitted: - Remove HTML5 note (by domfarolino) https://github.com/w3c/webappsec-referrer-policy/pull/140 1 pull requests merged: - Remove HTML5 note https://github.com/w3c/webappsec-referrer-policy/pull/140 * w3c/webappsec-cspee (+1/-0/💬0) 1 pull requests submitted: - Fix examples involving wildcard host matching. (by antosart) https://github.com/w3c/webappsec-cspee/pull/13 * WICG/trusted-types (+1/-0/💬1) 1 pull requests submitted: - Fix invalid Web IDL syntax (by foolip) https://github.com/w3c/webappsec-trusted-types/pull/282 1 pull requests received 1 new comments: - #282 Fix invalid Web IDL syntax (1 by foolip) https://github.com/w3c/webappsec-trusted-types/pull/282 Repositories tracked by this digest: ----------------------------------- * https://github.com/w3c/webappsec * https://github.com/w3c/webappsec-subresource-integrity * https://github.com/w3c/webappsec-csp * https://github.com/w3c/webappsec-mixed-content * https://github.com/w3c/webappsec-upgrade-insecure-requests * https://github.com/w3c/webappsec-credential-management * https://github.com/w3c/permissions * https://github.com/w3c/webappsec-referrer-policy * https://github.com/w3c/webappsec-secure-contexts * https://github.com/w3c/webappsec-clear-site-data * https://github.com/w3c/webappsec-cowl * https://github.com/w3c/webappsec-epr * https://github.com/w3c/webappsec-suborigins * https://github.com/w3c/webappsec-cspee * https://github.com/w3c/webappsec-feature-policy * https://github.com/w3c/webappsec-fetch-metadata * https://github.com/WICG/trusted-types * https://github.com/w3c/webappsec-unofficial-drafts
Received on Monday, 6 July 2020 17:00:15 UTC