-
Notifications
You must be signed in to change notification settings - Fork 754
Description
The CSS values spec basically says there's no security concerns:
This specification mostly just defines units that are common to CSS specifications, and which present no security concerns.
In the Blink Intent to Implement and Ship: Advanced attr() thread, multiple concerns have been raised that attr() can be used as a tool for data exfiltration of sensitive data like passwords, nonce, etc.
And it's a much easier-to-use weapon compared to attribute selectors, which has to exfiltrate attribute value character-by-character in an iterative/recursive manner.
Other than "try harder to block CSS injection", do we have other ideas to address the security concerns? For example, blacklisting certain attributes (e.g., nonce, value, etc.), or even whitelisting attributes allowed in attr() (as suggested by @mikewest here)?
Metadata
Metadata
Assignees
Type
Projects
Status
Status