- From: W3C Webmaster via GitHub API <sysbot+gh@w3.org>
- Date: Mon, 03 Feb 2025 17:00:24 +0000
- To: public-webappsec@w3.org
- Message-Id: <E1tezo8-00CB2P-2D@janus.w3.internal>
Issues ------ * w3c/webappsec (+0/-0/💬1) 1 issues received 1 new comments: - #664 Provide clear guidelines for what `Timing-Allow-Origin` should expose (1 by noamr) https://github.com/w3c/webappsec/issues/664 * w3c/webappsec-csp (+1/-0/💬0) 1 issues created: - connect-src test suite allows multiple non-interopable implementations. (by lukewarlow) https://github.com/w3c/webappsec-csp/issues/706 * w3c/webappsec-permissions-policy (+0/-0/💬1) 1 issues received 1 new comments: - #189 Proposal: define default for all (1 by vphantom) https://github.com/w3c/webappsec-permissions-policy/issues/189 [feature question] * w3c/webappsec-trusted-types (+0/-1/💬1) 1 issues received 1 new comments: - #520 Finalise spec mechanism for event handlers (1 by fred-wang) https://github.com/w3c/trusted-types/issues/520 [spec] 1 issues closed: - Add test for event handler content attribute handling for false positive event handler attributes https://github.com/w3c/trusted-types/issues/573 Pull requests ------------- * w3c/webappsec-csp (+1/-0/💬1) 1 pull requests submitted: - Use given CSP list in navigation request checking (by domenic) https://github.com/w3c/webappsec-csp/pull/705 1 pull requests received 1 new comments: - #692 Use "navigation request's policy container's CSP list" instead of "navigation request's client's global object's CSP list" (1 by domenic) https://github.com/w3c/webappsec-csp/pull/692 [blocked] * w3c/permissions (+1/-0/💬1) 1 pull requests submitted: - Allow for the query algorithm to return `prompt` or `denied` when document is not `allowed to use` (by aselya) https://github.com/w3c/permissions/pull/458 1 pull requests received 1 new comments: - #458 Allow for the query algorithm to return `prompt` or `denied` when document is not `allowed to use` (1 by miketaylr) https://github.com/w3c/permissions/pull/458 * w3c/webappsec-permissions-policy (+1/-0/💬0) 1 pull requests submitted: - Add allow and src attribute to potential permissions policy violation report (by shhnjk) https://github.com/w3c/webappsec-permissions-policy/pull/559 * w3c/webappsec-fetch-metadata (+0/-0/💬8) 1 pull requests received 8 new comments: - #89 Define `Sec-Fetch-Frame-Ancestors`. (8 by annevk, bvandersloot-mozilla, ddworken, johannhof, sjledoux) https://github.com/w3c/webappsec-fetch-metadata/pull/89 Repositories tracked by this digest: ----------------------------------- * https://github.com/w3c/webappsec * https://github.com/w3c/webappsec-subresource-integrity * https://github.com/w3c/webappsec-csp * https://github.com/w3c/webappsec-mixed-content * https://github.com/w3c/webappsec-upgrade-insecure-requests * https://github.com/w3c/webappsec-credential-management * https://github.com/w3c/permissions * https://github.com/w3c/permissions-registry * https://github.com/w3c/webappsec-referrer-policy * https://github.com/w3c/webappsec-secure-contexts * https://github.com/w3c/webappsec-clear-site-data * https://github.com/w3c/webappsec-cowl * https://github.com/w3c/webappsec-epr * https://github.com/w3c/webappsec-suborigins * https://github.com/w3c/webappsec-cspee * https://github.com/w3c/webappsec-permissions-policy * https://github.com/w3c/webappsec-fetch-metadata * https://github.com/w3c/webappsec-trusted-types * https://github.com/w3c/webappsec-change-password-url * https://github.com/w3c/webappsec-post-spectre-webdev -- Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config
Received on Monday, 3 February 2025 17:00:25 UTC