-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Interaction with sandbox attribute #20
Comments
+CC @camillelamy and @mikewest who might want to bring more informations. Some data we have: ~94% of About repurposing Main reasonsFully sandboxed iframe are not strict enough. The navigation response in an Ignoring this, We could imagine <iframe sandbox="
allow-same-origin
disallow-unscoped-origin # new flag
disallow-autofill # new flag
allow-popups-no-opener # new flag
...
"> (+ all of the possible Problem with inheritance: Sandbox flags are inherited by popups. For instance, in the case of ads, this means that every time someone clicks on an ad, the Problem with Footnotes
|
Thank you for reiterating those. Here's how I was thinking about them:
|
Looking at this again for WebKit/standards-positions#45 it occurred to us with everyone aligning on cross-site cookies, repurposing the
sandbox
attribute in some manner might be within grasp?I realize this was discussed to some extent before in mozilla/standards-positions#628 (comment) but it would be nice to have this flushed out a bit more. And also discussed in a place that's a bit more appropriate.
The text was updated successfully, but these errors were encountered: