-
Notifications
You must be signed in to change notification settings - Fork 231
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
web_accessible_resources and UUID leaking #100
Comments
I just double-checked, and no, my extension does NOT leak the origin/UUID. Side note, whether Side note 2: I guess that I can remove |
thanks Rob - since you're planning on removing web_accessible_resources i'll leave this open for you to close |
ps: you seem pretty familiar with this so maybe this is not needed, but here's some additional info if interested |
- Rely on CORS instead of work-arounds for public XPI files from AMO (#92) - Add work-around for crx access in Brave (#91) - Support source viewing of extensions from Microsoft Edge (#95) - Remove web_accessible_resourced to avoid UUID leak (#100) - Correct 0-padding of hashes (#104) - Update jsbeautifier to v1.14.0 (#110) - Support source viewing of extensions from Thunderbird (#111) - Fix domain front of AMO in Firefox add-on (#115) - Recognize CRX3 files served by addons.opera.com (#118) - Opera only: Add work-around to access addons.opera.com (#119) - web only: Add crx keyword to input field for keyword search (#99) - web only: Avoid breakage of web version when an extension runs a script (#113) - Refactor: remove unsupported declarativeWebRequest path - Refactor: Use declarative page actions to show button.
i was just doing some long overdue reading on how extensions (and in turn the browser) can be fingerprinted and i see that if an ext. uses "web_accessible_resources" (and JS is enabled), it's possible for a website to get the UUID of the ext.
in the CRX manifest i'm seeing "web_accessible_resources" and i'd just like to get your take on whether it may be affected by this
Bug 1405971
The text was updated successfully, but these errors were encountered: