- From: W3C Webmaster via GitHub API <sysbot+gh@w3.org>
- Date: Mon, 25 Nov 2024 17:00:29 +0000
- To: public-webappsec@w3.org
- Message-Id: <E1tFcRp-00Gbcb-0D@janus.w3.internal>
Issues
------
* w3c/webappsec-csp (+1/-0/💬4)
1 issues created:
- Consider recommending the usage of events instead of CSP reports for CSP WPTs (by mbrodesser-Igalia)
https://github.com/w3c/webappsec-csp/issues/690
2 issues received 4 new comments:
- #688 Assigning `location.href` to a `javascript:...` is a form of eval (3 by annevk, dinofx)
https://github.com/w3c/webappsec-csp/issues/688
- #389 Initializing a document's CSP list requires synchronous cross-process access (1 by mbrodesser-Igalia)
https://github.com/w3c/webappsec-csp/issues/389
* w3c/webappsec-trusted-types (+0/-0/💬1)
1 issues received 1 new comments:
- #483 SVGScriptElement needs TT protection too (1 by annevk)
https://github.com/w3c/trusted-types/issues/483
Pull requests
-------------
* w3c/webappsec (+1/-1/💬0)
1 pull requests submitted:
- Update 2024-10-16-agenda - Post Quantum Workshop (by simoneonofri)
https://github.com/w3c/webappsec/pull/663
1 pull requests merged:
- Update 2024-10-16-agenda - Post Quantum Workshop
https://github.com/w3c/webappsec/pull/663
* w3c/webappsec-csp (+2/-1/💬0)
2 pull requests submitted:
- Use "navigation request's policy container's CSP list" instead of "navigation request's client's global object's CSP list" (by mbrodesser-Igalia)
https://github.com/w3c/webappsec-csp/pull/692
- [editorial] Fix wrong references to parse a serialized CSP list (by antosart)
https://github.com/w3c/webappsec-csp/pull/691
1 pull requests merged:
- [editorial] Fix wrong references to parse a serialized CSP list
https://github.com/w3c/webappsec-csp/pull/691
* w3c/webappsec-fetch-metadata (+0/-0/💬1)
1 pull requests received 1 new comments:
- #89 Define `Sec-Fetch-Frame-Ancestors`. (1 by cfredric)
https://github.com/w3c/webappsec-fetch-metadata/pull/89
* w3c/webappsec-trusted-types (+1/-1/💬5)
1 pull requests submitted:
- Revert "Change Script Enforcement Mechanism to use flags" (by koto)
https://github.com/w3c/trusted-types/pull/565
1 pull requests received 5 new comments:
- #533 Change Script Enforcement Mechanism to use flags (5 by domfarolino, koto, lukewarlow)
https://github.com/w3c/trusted-types/pull/533
1 pull requests merged:
- Revert "Change Script Enforcement Mechanism to use flags"
https://github.com/w3c/trusted-types/pull/565
Repositories tracked by this digest:
-----------------------------------
* https://github.com/w3c/webappsec
* https://github.com/w3c/webappsec-subresource-integrity
* https://github.com/w3c/webappsec-csp
* https://github.com/w3c/webappsec-mixed-content
* https://github.com/w3c/webappsec-upgrade-insecure-requests
* https://github.com/w3c/webappsec-credential-management
* https://github.com/w3c/permissions
* https://github.com/w3c/permissions-registry
* https://github.com/w3c/webappsec-referrer-policy
* https://github.com/w3c/webappsec-secure-contexts
* https://github.com/w3c/webappsec-clear-site-data
* https://github.com/w3c/webappsec-cowl
* https://github.com/w3c/webappsec-epr
* https://github.com/w3c/webappsec-suborigins
* https://github.com/w3c/webappsec-cspee
* https://github.com/w3c/webappsec-permissions-policy
* https://github.com/w3c/webappsec-fetch-metadata
* https://github.com/w3c/webappsec-trusted-types
* https://github.com/w3c/webappsec-change-password-url
* https://github.com/w3c/webappsec-post-spectre-webdev
--
Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config
Received on Monday, 25 November 2024 17:00:29 UTC