- From: W3C Webmaster via GitHub API <sysbot+gh@w3.org>
- Date: Mon, 25 Nov 2024 17:00:29 +0000
- To: public-webappsec@w3.org
- Message-Id: <E1tFcRp-00Gbcb-0D@janus.w3.internal>
Issues ------ * w3c/webappsec-csp (+1/-0/💬4) 1 issues created: - Consider recommending the usage of events instead of CSP reports for CSP WPTs (by mbrodesser-Igalia) https://github.com/w3c/webappsec-csp/issues/690 2 issues received 4 new comments: - #688 Assigning `location.href` to a `javascript:...` is a form of eval (3 by annevk, dinofx) https://github.com/w3c/webappsec-csp/issues/688 - #389 Initializing a document's CSP list requires synchronous cross-process access (1 by mbrodesser-Igalia) https://github.com/w3c/webappsec-csp/issues/389 * w3c/webappsec-trusted-types (+0/-0/💬1) 1 issues received 1 new comments: - #483 SVGScriptElement needs TT protection too (1 by annevk) https://github.com/w3c/trusted-types/issues/483 Pull requests ------------- * w3c/webappsec (+1/-1/💬0) 1 pull requests submitted: - Update 2024-10-16-agenda - Post Quantum Workshop (by simoneonofri) https://github.com/w3c/webappsec/pull/663 1 pull requests merged: - Update 2024-10-16-agenda - Post Quantum Workshop https://github.com/w3c/webappsec/pull/663 * w3c/webappsec-csp (+2/-1/💬0) 2 pull requests submitted: - Use "navigation request's policy container's CSP list" instead of "navigation request's client's global object's CSP list" (by mbrodesser-Igalia) https://github.com/w3c/webappsec-csp/pull/692 - [editorial] Fix wrong references to parse a serialized CSP list (by antosart) https://github.com/w3c/webappsec-csp/pull/691 1 pull requests merged: - [editorial] Fix wrong references to parse a serialized CSP list https://github.com/w3c/webappsec-csp/pull/691 * w3c/webappsec-fetch-metadata (+0/-0/💬1) 1 pull requests received 1 new comments: - #89 Define `Sec-Fetch-Frame-Ancestors`. (1 by cfredric) https://github.com/w3c/webappsec-fetch-metadata/pull/89 * w3c/webappsec-trusted-types (+1/-1/💬5) 1 pull requests submitted: - Revert "Change Script Enforcement Mechanism to use flags" (by koto) https://github.com/w3c/trusted-types/pull/565 1 pull requests received 5 new comments: - #533 Change Script Enforcement Mechanism to use flags (5 by domfarolino, koto, lukewarlow) https://github.com/w3c/trusted-types/pull/533 1 pull requests merged: - Revert "Change Script Enforcement Mechanism to use flags" https://github.com/w3c/trusted-types/pull/565 Repositories tracked by this digest: ----------------------------------- * https://github.com/w3c/webappsec * https://github.com/w3c/webappsec-subresource-integrity * https://github.com/w3c/webappsec-csp * https://github.com/w3c/webappsec-mixed-content * https://github.com/w3c/webappsec-upgrade-insecure-requests * https://github.com/w3c/webappsec-credential-management * https://github.com/w3c/permissions * https://github.com/w3c/permissions-registry * https://github.com/w3c/webappsec-referrer-policy * https://github.com/w3c/webappsec-secure-contexts * https://github.com/w3c/webappsec-clear-site-data * https://github.com/w3c/webappsec-cowl * https://github.com/w3c/webappsec-epr * https://github.com/w3c/webappsec-suborigins * https://github.com/w3c/webappsec-cspee * https://github.com/w3c/webappsec-permissions-policy * https://github.com/w3c/webappsec-fetch-metadata * https://github.com/w3c/webappsec-trusted-types * https://github.com/w3c/webappsec-change-password-url * https://github.com/w3c/webappsec-post-spectre-webdev -- Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config
Received on Monday, 25 November 2024 17:00:29 UTC