Weekly github digest (WebAppSec specs)

Issues
------
* w3c/webappsec (+0/-0/💬2)
  2 issues received 2 new comments:
  - #668 Planning 2025-03-19 (1 by yoavweiss)
    https://github.com/w3c/webappsec/issues/668 
  - #656 CSP and data exfiltration (1 by blu25)
    https://github.com/w3c/webappsec/issues/656 

* w3c/webappsec-csp (+0/-1/💬5)
  1 issues received 5 new comments:
  - #706 connect-src test suite allows multiple non-interopable implementations. (5 by annevk, lukewarlow)
    https://github.com/w3c/webappsec-csp/issues/706 [interop] 

  1 issues closed:
  - connect-src test suite allows multiple non-interopable implementations. https://github.com/w3c/webappsec-csp/issues/706 [interop] 

* w3c/webappsec-permissions-policy (+0/-1/💬6)
  3 issues received 6 new comments:
  - #561 What is the process for making changes? (3 by annevk, shhnjk)
    https://github.com/w3c/webappsec-permissions-policy/issues/561 
  - #273 Prevent programmatic focus in iframe (1 by annevk)
    https://github.com/w3c/webappsec-permissions-policy/issues/273 [proposed feature] 
  - #189 Proposal: define default for all (2 by rgant)
    https://github.com/w3c/webappsec-permissions-policy/issues/189 [feature question] 

  1 issues closed:
  - Prevent programmatic focus in iframe https://github.com/w3c/webappsec-permissions-policy/issues/273 [proposed feature] 

* w3c/webappsec-trusted-types (+0/-2/💬11)
  7 issues received 11 new comments:
  - #580 CSP syntax for `require-trusted-types-for` should be forgiving (1 by lukewarlow)
    https://github.com/w3c/trusted-types/issues/580 
  - #576 Improve/Rewrite tests checking for CSP violations (1 by fred-wang)
    https://github.com/w3c/trusted-types/issues/576 
  - #575 Add test for policies with disposition=report in workers (2 by annevk, fred-wang)
    https://github.com/w3c/trusted-types/issues/575 
  - #574 Add tests for "Should Trusted Type policy creation be blocked by Content Security Policy" in workers (1 by fred-wang)
    https://github.com/w3c/trusted-types/issues/574 
  - #526 Add WPTs for `report-uri` with Workers (1 by fred-wang)
    https://github.com/w3c/trusted-types/issues/526 
  - #513 Add WPTs for CSP `sandbox allow-scripts` combined with Trusted Types (2 by fred-wang, mbrodesser-Igalia)
    https://github.com/w3c/trusted-types/issues/513 
  - #270 JavaScript event for tracking (and blocking) policy creation (3 by annevk, fred-wang, lukewarlow)
    https://github.com/w3c/trusted-types/issues/270 [spec] [future] [proposed-removal] 

  2 issues closed:
  - Improve/Rewrite tests checking for CSP violations https://github.com/w3c/trusted-types/issues/576 
  - SVGScriptElement needs TT protection too https://github.com/w3c/trusted-types/issues/483 



Pull requests
-------------
* w3c/webappsec-subresource-integrity (+0/-0/💬4)
  1 pull requests received 4 new comments:
  - #129 Revive require-sri-for for scripts (4 by annevk, dveditz, mozfreddyb, yoavweiss)
    https://github.com/w3c/webappsec-subresource-integrity/pull/129 

* w3c/webappsec-permissions-policy (+0/-0/💬2)
  1 pull requests received 2 new comments:
  - #499 Update "Is feature enabled in document for origin?" behavior (2 by arichiv, jkarlin)
    https://github.com/w3c/webappsec-permissions-policy/pull/499 

* w3c/webappsec-trusted-types (+0/-2/💬0)
  2 pull requests merged:
  - Ensure element's namespace is HTML, SVG or MathML before covering eve…
    https://github.com/w3c/trusted-types/pull/578 
  - Add SVGScriptElement handling to the spec
    https://github.com/w3c/trusted-types/pull/581 


Repositories tracked by this digest:
-----------------------------------
* https://github.com/w3c/webappsec
* https://github.com/w3c/webappsec-subresource-integrity
* https://github.com/w3c/webappsec-csp
* https://github.com/w3c/webappsec-mixed-content
* https://github.com/w3c/webappsec-upgrade-insecure-requests
* https://github.com/w3c/webappsec-credential-management
* https://github.com/w3c/permissions
* https://github.com/w3c/permissions-registry
* https://github.com/w3c/webappsec-referrer-policy
* https://github.com/w3c/webappsec-secure-contexts
* https://github.com/w3c/webappsec-clear-site-data
* https://github.com/w3c/webappsec-cowl
* https://github.com/w3c/webappsec-epr
* https://github.com/w3c/webappsec-suborigins
* https://github.com/w3c/webappsec-cspee
* https://github.com/w3c/webappsec-permissions-policy
* https://github.com/w3c/webappsec-fetch-metadata
* https://github.com/w3c/webappsec-trusted-types
* https://github.com/w3c/webappsec-change-password-url
* https://github.com/w3c/webappsec-post-spectre-webdev


-- 
Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config

Received on Monday, 10 March 2025 17:00:26 UTC