- From: <bugzilla@jessica.w3.org>
- Date: Mon, 08 Feb 2016 22:23:37 +0000
- To: public-webcrypto@w3.org
https://www.w3.org/Bugs/Public/show_bug.cgi?id=29438 Bug ID: 29438 Summary: JSON.stringify as invoked by wrapKey can have side-effects depending on what you pass it Product: Web Cryptography Version: unspecified Hardware: PC OS: All Status: NEW Severity: normal Priority: P2 Component: Web Cryptography API Document Assignee: sleevi@google.com Reporter: bzbarsky@mit.edu CC: public-webcrypto@w3.org Target Milestone: --- The spec says: Let json be the result of representing key as a UTF-16 string conforming to the JSON grammar; for example, by executing the JSON.stringify algorithm specified in ECMA262. This needs to clearly define where the objects passed to JSON.stringify are coming from, because JSON.stringify will do things like get .toJSON properties and call them, so if the objects come from the page global and someone defines a .toJSON on Object.prototype in the page, that will get invoked during this process. Maybe the intent is that there be no observable side-effects; in that case the behavior needs to be clearly specified so as to avoid them. -- You are receiving this mail because: You are on the CC list for the bug.
Received on Monday, 8 February 2016 22:23:40 UTC