- From: W3C Webmaster via GitHub API <sysbot+gh@w3.org>
- Date: Mon, 22 Jan 2024 17:00:33 +0000
- To: public-webappsec@w3.org
- Message-Id: <E1rRxez-00CKZs-IQ@uranus.w3.org>
Issues ------ * w3c/webappsec-csp (+1/-0/💬4) 1 issues created: - `service-worker-src` directive (by bakkot) https://github.com/w3c/webappsec-csp/issues/638 2 issues received 4 new comments: - #634 Chrome/Safari trim nonces (1 by evilpie) https://github.com/w3c/webappsec-csp/issues/634 - #633 Resource hint blocking / "least restrictive" as specified does nothing? (3 by antosart, noamr) https://github.com/w3c/webappsec-csp/issues/633 * w3c/permissions (+1/-0/💬1) 1 issues created: - WebDriver: Should Set Permission apply to future browsing contexts? (by OrKoN) https://github.com/w3c/permissions/issues/437 1 issues received 1 new comments: - #419 WebDriver: Make it possible to pass a different origin to "Set Permission" (1 by miketaylr) https://github.com/w3c/permissions/issues/419 * w3c/webappsec-permissions-policy (+1/-1/💬0) 1 issues created: - methiyaowala (by Usermsn) https://github.com/w3c/webappsec-permissions-policy/issues/535 1 issues closed: - methiyaowala https://github.com/w3c/webappsec-permissions-policy/issues/535 * w3c/webappsec-trusted-types (+0/-14/💬68) 18 issues received 68 new comments: - #401 Is the `[[ScriptURL]]` slot needed? (1 by koto) https://github.com/w3c/trusted-types/issues/401 [proposed-removal] - #399 Is there agreement in the HTML-spec community that no new injection sinks will be added? (1 by lukewarlow) https://github.com/w3c/trusted-types/issues/399 - #398 Defer `fromLiteral`? (22 by Sora2455, caridy, koto, lukewarlow, mbrodesser-Igalia) https://github.com/w3c/trusted-types/issues/398 [proposed-removal] - #397 Defer integration with Dynamic Code Brand Checks? (1 by lukewarlow) https://github.com/w3c/trusted-types/issues/397 - #393 Incorrect assertion within Example 18 (2 by koto, lukewarlow) https://github.com/w3c/trusted-types/issues/393 - #386 Are `TrustedTypePolicy`'s `create*` methods intentionally not `readonly`? (5 by mbrodesser-Igalia, smaug----) https://github.com/w3c/trusted-types/issues/386 - #385 Are all injection sinks covered by the spec? (9 by annevk, lukewarlow, mbrodesser-Igalia) https://github.com/w3c/trusted-types/issues/385 - #384 Are `getAttributeType` and `getPropertyType` methods neccessary? (1 by lukewarlow) https://github.com/w3c/trusted-types/issues/384 - #380 TrustedTypes bypass using iframes (1 by koto) https://github.com/w3c/trusted-types/issues/380 - #379 should `null` & `undefined` for sinks requiring TT be a passthrough ? (2 by koto, lukewarlow) https://github.com/w3c/trusted-types/issues/379 - #360 Can we conditionally enforce Trusted Types based on document response type in XHR? (3 by annevk, koto) https://github.com/w3c/trusted-types/issues/360 [spec] [security] - #359 Maybe enforce Trusted Types in XSL's xsl:text (1 by annevk) https://github.com/w3c/trusted-types/issues/359 - #357 Add SVG <use> href attribute to Trusted Types enforcement (4 by koto, mozfreddyb, shhnjk) https://github.com/w3c/trusted-types/issues/357 - #342 CfC to publish as an FPWD. (1 by lukewarlow) https://github.com/w3c/trusted-types/issues/342 - #305 Maybe remove plugin enforcement from Trusted Types? (4 by annevk, koto) https://github.com/w3c/trusted-types/issues/305 [future] - #288 Consider enforcing TT for custom attributes. (1 by koto) https://github.com/w3c/trusted-types/issues/288 [future] - #223 Handle innerHTML of svg in IE (1 by lukewarlow) https://github.com/w3c/trusted-types/issues/223 [polyfill] - #207 Finalize the integrations that guard eval & Function.constructor (8 by koto, lukewarlow, mbrodesser-Igalia) https://github.com/w3c/trusted-types/issues/207 [tc39] 14 issues closed: - TrustedTypes bypass using iframes https://github.com/w3c/trusted-types/issues/380 - Consider enforcing TT for custom attributes. https://github.com/w3c/trusted-types/issues/288 [future] - Consider adding a type for base.href https://github.com/w3c/trusted-types/issues/172 [polyfill] [spec] [future] - Expose information on status of TrustedTypes enforcement https://github.com/w3c/trusted-types/issues/36 [spec] [future] - Maybe remove plugin enforcement from Trusted Types? https://github.com/w3c/trusted-types/issues/305 [future] - 'Create a Trusted Type' algorithm returns error value in step 6 https://github.com/w3c/trusted-types/issues/382 - Incorrect assertion within Example 18 https://github.com/w3c/trusted-types/issues/393 - Add SVG <use> href attribute to Trusted Types enforcement https://github.com/w3c/trusted-types/issues/357 - Are `TrustedTypePolicy`'s `create*` methods intentionally not `readonly`? https://github.com/w3c/trusted-types/issues/386 - Missing integration with new unsafe HTML parsing methods https://github.com/w3c/trusted-types/issues/403 - Should `require-trusted-types-for` support trusted scripts and trusted script URLs? https://github.com/w3c/trusted-types/issues/383 - Defer integration with Dynamic Code Brand Checks? https://github.com/w3c/trusted-types/issues/397 - Handle innerHTML of svg in IE https://github.com/w3c/trusted-types/issues/223 [polyfill] - CfC to publish as an FPWD. https://github.com/w3c/trusted-types/issues/342 Pull requests ------------- * w3c/webappsec (+1/-1/💬0) 1 pull requests submitted: - Comments from PING on charter 2024 (by plehegar) https://github.com/w3c/webappsec/pull/640 1 pull requests merged: - Comments from PING on charter 2024 https://github.com/w3c/webappsec/pull/640 * w3c/webappsec-csp (+1/-0/💬0) 1 pull requests submitted: - Resource hint: check directives explicitly (by noamr) https://github.com/w3c/webappsec-csp/pull/637 * w3c/permissions (+0/-1/💬1) 1 pull requests received 1 new comments: - #436 Require an explicit origin for WebDriver BiDi automation (1 by miketaylr) https://github.com/w3c/permissions/pull/436 1 pull requests merged: - Require an explicit origin for WebDriver BiDi automation https://github.com/w3c/permissions/pull/436 * w3c/webappsec-trusted-types (+6/-6/💬7) 6 pull requests submitted: - Changed incorrect error mention in Create a Trusted Type algorithm. (by koto) https://github.com/w3c/trusted-types/pull/410 - Added a comment about fromLiteral. (by koto) https://github.com/w3c/trusted-types/pull/409 - Add goal for transitioning websites to save states (by mbrodesser-Igalia) https://github.com/w3c/trusted-types/pull/408 - Merged HTML parsing sinks with DOM XSS sinks. (by koto) https://github.com/w3c/trusted-types/pull/407 - Add integration with setHTMLUnsafe and parseHTMLUnsafe (by lukewarlow) https://github.com/w3c/trusted-types/pull/406 - Remove `fromLiteral` from spec. (by lukewarlow) https://github.com/w3c/trusted-types/pull/405 4 pull requests received 7 new comments: - #407 Merged HTML parsing sinks with DOM XSS sinks. (1 by koto) https://github.com/w3c/trusted-types/pull/407 - #406 Add integration with setHTMLUnsafe and parseHTMLUnsafe (3 by lukewarlow, mbrodesser-Igalia) https://github.com/w3c/trusted-types/pull/406 - #405 Remove `fromLiteral` from spec. (2 by lukewarlow) https://github.com/w3c/trusted-types/pull/405 - #377 Add detail about fromLiteral to explainer. (1 by lukewarlow) https://github.com/w3c/trusted-types/pull/377 6 pull requests merged: - Add use case for safely transitioning websites to not use any DOM XSS injection sinks https://github.com/w3c/trusted-types/pull/408 - Changed incorrect error mention in Create a Trusted Type algorithm. https://github.com/w3c/trusted-types/pull/410 - Added a comment about fromLiteral. https://github.com/w3c/trusted-types/pull/409 - Add integration with setHTMLUnsafe and parseHTMLUnsafe https://github.com/w3c/trusted-types/pull/406 - Merged HTML parsing sinks with DOM XSS sinks. https://github.com/w3c/trusted-types/pull/407 - docs: Include repository field in package.json https://github.com/w3c/trusted-types/pull/371 Repositories tracked by this digest: ----------------------------------- * https://github.com/w3c/webappsec * https://github.com/w3c/webappsec-subresource-integrity * https://github.com/w3c/webappsec-csp * https://github.com/w3c/webappsec-mixed-content * https://github.com/w3c/webappsec-upgrade-insecure-requests * https://github.com/w3c/webappsec-credential-management * https://github.com/w3c/permissions * https://github.com/w3c/permissions-registry * https://github.com/w3c/webappsec-referrer-policy * https://github.com/w3c/webappsec-secure-contexts * https://github.com/w3c/webappsec-clear-site-data * https://github.com/w3c/webappsec-cowl * https://github.com/w3c/webappsec-epr * https://github.com/w3c/webappsec-suborigins * https://github.com/w3c/webappsec-cspee * https://github.com/w3c/webappsec-permissions-policy * https://github.com/w3c/webappsec-fetch-metadata * https://github.com/w3c/webappsec-trusted-types * https://github.com/w3c/webappsec-change-password-url * https://github.com/w3c/webappsec-post-spectre-webdev -- Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config
Received on Monday, 22 January 2024 17:00:36 UTC