Weekly github digest (WebAppSec specs)

Issues
------
* w3c/webappsec (+0/-0/💬1)
  1 issues received 1 new comments:
  - #662 Planning 2024-11-20. (1 by kmonsen)
    https://github.com/w3c/webappsec/issues/662 

* w3c/webappsec-csp (+0/-0/💬3)
  2 issues received 3 new comments:
  - #633 Resource hint blocking / "least restrictive" as specified does nothing? (1 by jonathanKingston)
    https://github.com/w3c/webappsec-csp/issues/633 
  - #322 Handling of javascript: navigations is not interoperable, spec doesn't match most implementations (2 by dinofx, mbrodesser-Igalia)
    https://github.com/w3c/webappsec-csp/issues/322 

* w3c/webappsec-clear-site-data (+0/-0/💬3)
  1 issues received 3 new comments:
  - #82 Clear a specific cookie (3 by stolendata, yoavweiss)
    https://github.com/w3c/webappsec-clear-site-data/issues/82 

* w3c/webappsec-permissions-policy (+0/-0/💬1)
  1 issues received 1 new comments:
  - #481 Proposal: allow grouping permissions by year (1 by Seirdy)
    https://github.com/w3c/webappsec-permissions-policy/issues/481 

* w3c/webappsec-trusted-types (+0/-6/💬13)
  9 issues received 13 new comments:
  - #554 Add tests for getAttributeType()/getPropertyType() for embed@src, object@codebase and object@data (2 by fred-wang, koto)
    https://github.com/w3c/trusted-types/issues/554 
  - #553 getPropertyType/getAttributeType when null namespaces are passed. (2 by fred-wang, koto)
    https://github.com/w3c/trusted-types/issues/553 
  - #549 WPTs for pre-navigation check of form-submission should be added (1 by koto)
    https://github.com/w3c/trusted-types/issues/549 
  - #541 "stringifying" in "Process value with a default policy" needs to be defined (2 by koto)
    https://github.com/w3c/trusted-types/issues/541 [spec] 
  - #534 Should "Get Trusted Type compliant string" check `isHTML`/`isScript`/`isScriptURL`? (1 by koto)
    https://github.com/w3c/trusted-types/issues/534 
  - #509 "Should Trusted Type policy creation be blocked by Content Security Policy?" passes "directive" instead of directive's name to "Create a violation object for global, policy, and directive"  (1 by koto)
    https://github.com/w3c/trusted-types/issues/509 
  - #504 `createPolicy`'s permitted policy names are inconsistent with CSP's permitted policy names (1 by koto)
    https://github.com/w3c/trusted-types/issues/504 [spec] 
  - #466 Creating a policy with policyName="" is possible, but can't be referred to by the "trusted-types" CSP directive (2 by koto)
    https://github.com/w3c/trusted-types/issues/466 
  - #449 Add test to <block-string-assignment-to-Element-setAttribute.html> which checks trusted types can be assigned to non-injection sinks (1 by koto)
    https://github.com/w3c/trusted-types/issues/449 

  6 issues closed:
  - WPTs for pre-navigation check of form-submission should be added https://github.com/w3c/trusted-types/issues/549 
  - "Should Trusted Type policy creation be blocked by Content Security Policy?" passes "directive" instead of directive's name to "Create a violation object for global, policy, and directive"  https://github.com/w3c/trusted-types/issues/509 
  - Should the default policy be invoked when trusted types are not required? https://github.com/w3c/trusted-types/issues/536 
  - getPropertyType/getAttributeType when null namespaces are passed. https://github.com/w3c/trusted-types/issues/553 
  - Add tests for getAttributeType()/getPropertyType() for embed@src, object@codebase and object@data https://github.com/w3c/trusted-types/issues/554 
  - There's a lack of test coverage over the namespace aspect of getPropertyType https://github.com/w3c/trusted-types/issues/429 



Pull requests
-------------
* w3c/webappsec-referrer-policy (+1/-1/💬1)
  1 pull requests submitted:
  - Update a step number referenced in the fetch spec (by shanehandley)
    https://github.com/w3c/webappsec-referrer-policy/pull/173 

  1 pull requests received 1 new comments:
  - #173 Update a step number referenced in the fetch spec (1 by w3cbot)
    https://github.com/w3c/webappsec-referrer-policy/pull/173 

  1 pull requests merged:
  - Update a step number referenced in the fetch spec
    https://github.com/w3c/webappsec-referrer-policy/pull/173 

* w3c/webappsec-fetch-metadata (+0/-0/💬1)
  1 pull requests received 1 new comments:
  - #89 Define `Sec-Fetch-Frame-Ancestors`. (1 by mozfreddyb)
    https://github.com/w3c/webappsec-fetch-metadata/pull/89 

* w3c/webappsec-trusted-types (+2/-0/💬1)
  2 pull requests submitted:
  - Disallow empty policy names on creation. (by koto)
    https://github.com/w3c/trusted-types/pull/560 
  - Replace 'has type' with less confusing 'is an instance of'. (by koto)
    https://github.com/w3c/trusted-types/pull/559 

  1 pull requests received 1 new comments:
  - #545 Export the two CSP directives (1 by robbiemc)
    https://github.com/w3c/trusted-types/pull/545 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/w3c/webappsec
* https://github.com/w3c/webappsec-subresource-integrity
* https://github.com/w3c/webappsec-csp
* https://github.com/w3c/webappsec-mixed-content
* https://github.com/w3c/webappsec-upgrade-insecure-requests
* https://github.com/w3c/webappsec-credential-management
* https://github.com/w3c/permissions
* https://github.com/w3c/permissions-registry
* https://github.com/w3c/webappsec-referrer-policy
* https://github.com/w3c/webappsec-secure-contexts
* https://github.com/w3c/webappsec-clear-site-data
* https://github.com/w3c/webappsec-cowl
* https://github.com/w3c/webappsec-epr
* https://github.com/w3c/webappsec-suborigins
* https://github.com/w3c/webappsec-cspee
* https://github.com/w3c/webappsec-permissions-policy
* https://github.com/w3c/webappsec-fetch-metadata
* https://github.com/w3c/webappsec-trusted-types
* https://github.com/w3c/webappsec-change-password-url
* https://github.com/w3c/webappsec-post-spectre-webdev


-- 
Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config

Received on Monday, 4 November 2024 17:00:24 UTC