Advertisement
Guest User

Untitled

a guest
Jul 17th, 2018
67
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.78 KB | None | 0 0
  1. Inserting un-sanitized remote content is a security problem. For example, JavaScript can be passed as href/src/on** etc.
  2. Add-on should ensure such strings are not-executable (and not javascript:somefunction).
  3. In case of href/src, a simple startsWith('http') would be sufficient for this purpose.
  4.  
  5. eg:
  6. js/popup/popupdummy.js#L163
  7. js/popup/popupdummy.js#L189
  8.  
  9. Please fix them and submit again. Thank you.
  10.  
  11. Please note that if add-on contains obfuscated, minified, concatenated or otherwise machine-generated code, the code has not been checked yet and their sources will be required in future updates.
  12. Self-minified: https://developer.mozilla.org/en-US/Add-ons/Source_Code_Submission
  13. Third Party Library: https://developer.mozilla.org/en-US/Add-ons/Third_Party_Library_Usage
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement