Hi Yutaka, (and cc chromium-extensions@ which has much more subscribers)
First off, I'd like to thank you for your valuable work. But I can't see your document. Did you send a publicly visible link to it? If you attached it as a file, Google Groups might have discarded it.
What was the justification for adding another web security feature that affects content scripts? Content scripts run as part of the browser chrome, and have their own security model. In short, a content script that is explicitly trusted by the user through host permissions should be able to override the website developer's desired behavior in a secure manner.
We've already seen the consequences of implementing web security features in a way that negatively affect content scripts with Firefox's CSP implementation, which they're trying hard to walk back. We're starting to see similar problems in Chromium with the CORB and CORS hardening work, as people write design documents and specs that don't consider Chrome Extensions, or consider them only as an afterthought, and then implement those designs in a way that destroys valid and secure usecase.
Chrome's security hardening work is extremely valuable, and frankly COOP seems completely uncontroversial, but I don't see any reason why COEP should affect resources embedded by content scripts, and doing so is a major regression in the functionality of Chromiums's extension API. And without a design document that explicitly addresses the security model of the extension ecosystem, I can't see what security benefit this brings to the user.
Do you have such a design document?