Simeon Vincent
unread,Jan 5, 2021, 8:39:03 PM1/5/21Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Chromium Extensions, go green, guest...@gmail.com, mattyg...@gmail.com
Go Green,
I don't have a hard answer for you because we don't have an updated policy that I can refer to and discuss. That said, what we're trying to achieve with this change is to make extensions safer by allowing reviewers to see, understand, and assess the risks that the extension poses to end users. From that point of view, making the NTP just a frame for web content doesn't feel to me like it follows the spirit of that objective.
While I do not have a concrete answer to your question, I would encourage you not to go this route. Instead, I would suggest considering other ways to customize your end user experience. For example, could you get a JSON object with user specific customizations at runtime? Can you bake a known set of options into the extension itself?
If you'd like to get more specific about your use case I'm happy to kick around ideas here.
> Messaging around remote code has been focused on scripts, so this will be good to clarify. - mattyg…@
That's largely because remote JS is a major attack vector, but as I mentioned above our main focus is risk assessment.
Hypothetically, let's say all known uses of HTML fragments and iframes are non-malicious, but due to the RHC restrictions attackers migrate from remote JS to remotely rendered HTML content. In this scenario CWS would most likely have to take an aggressive position against remotely loaded HTML in order to protect users.
Cheers,
Simeon - @dotproto
Chrome Extensions DevRel