Volunteers might want to add a compiler warning for writing to 'innerHTML', but 
IMO, even React can't prevent XSS attacks.  Frameworks are just building blocks 
used to build secure solutions, but the security comes from proper use by the 
developer.

I have not had time to look into the new 'third-party' code that's been added, 
but before anyone starts on a release, the project needs to decide on whether 
to bundle or download that code.  The cost of bundling is high, and I'd 
recommend not bundling third-party code that is being actively developed 
somewhere.

My 2 cents,
-Alex

On 12/8/21, 3:08 PM, "Harbs" <harbs.li...@gmail.com> wrote:

    If you want your head to hurt, you can try reading this whole page on 
avoiding XSS:

    
https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcheatsheetseries.owasp.org%2Fcheatsheets%2FXSS_Filter_Evasion_Cheat_Sheet.html&amp;data=04%7C01%7Caharui%40adobe.com%7C500a0731eea14ffb332608d9ba9f93d3%7Cfa7b1b5a7b34438794aed2c178decee1%7C0%7C0%7C637746016814444700%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=iTfuUie8ptUL7tHC4%2FEbgEgQNIYxnPL0vkhck2wkeYk%3D&amp;reserved=0

    The numbers of ways to insert XSS is mind boggling.

    > On Dec 9, 2021, at 1:01 AM, Greg Dove <greg.d...@gmail.com> wrote:
    > 
    > That's all I meant also. I expect the React framework minimizes or avoids
    > use of it for example. I have no idea (I haven't checked) if it 
'sanitizes'
    > any use of it that it has internally, filtering out possible bad stuff in
    > setters, for example.
    > 
    > Using that 'dangerouslySetInnerHTML' or whatever it is, is actually quite
    > rare in React. It is still an option (as well as being a reminder) for
    > users. I wasn't meaning that we try to do the same for that, just that the
    > framework itself should pass some sort of scrutiny against what is
    > acceptable as 'normal' in terms of being secure. Sounds like you have
    > already looked into that, thanks!
    > 
    > 
    > 
    > 
    > On Thu, Dec 9, 2021 at 11:46 AM Harbs <harbs.li...@gmail.com> wrote:
    > 
    >> I went though every use of innerHTML and I only found two that really
    >> could use changing. I just changed those two cases.
    >> 
    >> I’m not convinced that it’s the job of the Framework to prevent users 
from
    >> introducing XSS attacks. The framework should not use things like 
innerHTML
    >> of setting src in ways that is not obvious to the user, but we shouldn’t 
be
    >> preventing the users from doing it themselves.
    >> 
    >> My $0.02,
    >> Harbs
    >> 
    >>> On Dec 8, 2021, at 8:39 AM, Yishay Weiss <yishayj...@hotmail.com> wrote:
    >>> 
    >>> In previous threads on the same topic documentation was cited as
    >> something holding us back from calling it a 1.0.
    >>> 
    >>> There’s also the marketing issue. From what I see, the active members of
    >> this community are not keen to take on marketing challenges, and this may
    >> not change in the foreseeable future, but ideally we would want to create
    >> some sort of buzz, and be ready to face questions following that. 
Silently
    >> bumping to 1.0 may be the best we can do at this point though…
    >>> 
    >>> The reason I brought up 1.0 on this thread was to decide what version
    >> the mvn snapshots will show after 0.9.9. Should we just vote on that?
    >>> 
    >>> Also, it would be good to pass on some of the knowledge I have gained in
    >> previous releases to others here, so this is an opportunity for 
volunteers
    >> to step up.
    >>> 
    >>> From: Harbs<mailto:harbs.li...@gmail.com>
    >>> Sent: Tuesday, December 7, 2021 10:15 PM
    >>> To: dev@royale.apache.org<mailto:dev@royale.apache.org>
    >>> Subject: Re: 0.9.9
    >>> 
    >>> It’s a bit of a stretch that it’s a concern because even where it’s
    >> used, the source is not typically going to be an outside source. I 
wouldn’t
    >> consider it an obstacle for “1.0”, but we should address it.
    >>> 
    >>>> On Dec 7, 2021, at 10:11 PM, Greg Dove <greg.d...@gmail.com> wrote:
    >>>> 
    >>>>> That said, we’re using innerHTML in some places in the Framework where
    >> it
    >>>> is not necessary. That should be fixed.
    >>>> 
    >>>> Yeah, that's actually what I was meaning. I don't know if there are any
    >>>> other things like this which we might have overlooked, or whether it is
    >>>> critical to consider these for '1.0'
    >>>> 
    >>>> 
    >>>> 
    >>>> 
    >>>> On Wed, Dec 8, 2021 at 9:00 AM Harbs <harbs.li...@gmail.com> wrote:
    >>>> 
    >>>>> In React, there’s a desire to set innerHTML because things are hard to
    >> do
    >>>>> there. In Royale, not so much.
    >>>>> 
    >>>>> That said, we’re using innerHTML in some places in the Framework where
    >> it
    >>>>> is not necessary. That should be fixed.
    >>>>> 
    >>>>>> On Dec 7, 2021, at 9:36 PM, Greg Dove <greg.d...@gmail.com> wrote:
    >>>>>> 
    >>>>>> We discussed at one point the potential security risks associated 
with
    >>>>>> using innerHTML in some code, for example and that other frameworks
    >> avoid
    >>>>>> that (React requires that a dev use a method called
    >>>>> dangerouslySetInnerHTML
    >>>>>> or something like that).
    >>>>> 
    >>>>> 
    >>> 
    >> 
    >> 


Reply via email to