Viet Ta
unread,Apr 4, 2023, 4:57:14 AM4/4/23Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Chromium Extensions, Simeon Vincent, Chromium Extensions, Stefan Van Damme
> I'm afraid you may have misunderstood the documentation. That page states that sandboxes pages are "served in a sandboxed unique origin." To get into the technical details, Chromium does this by using an
opaque origin (also known as a "null" origin) for sandboxed pages. Null origins are used when "The origin is 'privacy sensitive', or is an opaque origin as defined by the HTML > specification (specific cases are listed in the description section)" (
source).
Not sure if we're talking about the same thing. I'm talking about how we can define the policies for the sandbox in the "content_security_policy". Like this:
"content_security_policy": {
"sandbox": "sandbox allow-scripts; script-src 'self' https://example.com"
}, As you can see here it's possible to set the host of script-src to
https://example.com. Is that true or the document is lying?
> It also depends on what you're doing with the sandboxed page. If the remote code is being used to substantially change the extensino's functionality… well, that should probably be implemented in the extension itself.
Well, put it like this, we have to maintain a dozen of DOM extractor for specific domains. Sometimes some domains changed their UI and broke out collection logic. That's why we want to have the collection logic dynamically loaded from the our host so that we can quickly release the change and address the issue with minimal data loss.
So not like substantially changed the way the extension work, but some changes to how the data is collected only.