Excellent points John. Most users will indeed not review the full text of 
every single tiddler they import. I'm now thinking that pointing out which 
ones should indeed be reviewed more explicitly would be both easy and 
worthwhile.

At the tm-import-tiddlers widget level, any JS that's being imported could 
be flagged, with a simple highlight inviting the user to review the code 
before confirming the import when standard declared JS is detected, and a 
more insistent alert when the code is hidden or obfuscated (as in Finn's 
Base64 example). A simple exhaustive filter search should be able to cover 
all or most cases, including content-type=application/javascript, <script>, 
<object>, <iframe>. 

I feel (at my very modest level of understanding) that this would add a 
significant extra layer of security when drag-and-dropping as users could 
react when seeing JavaScript being imported where none was expected — when 
simply importing a random content tiddler for instance.

Given that new JS is only executable after rebooting the TW instance, even 
if the potentially malicious code is executed while parsing the imports, it 
shouldn't prove too much of an issue as the user with sudden doubts could 
immediately delete the imports and avoid any potential issues and would be 
invited to then share any concern with the TW community to understand if 
anything is wrong and nip the problem in the bud.

Best,
R²

-- 
You received this message because you are subscribed to the Google Groups 
"TiddlyWiki" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/tiddlywiki/21068b16-7cda-46fe-a1d9-520bc26e5221n%40googlegroups.com.

Reply via email to