The phrase "the real sandbox page" is dificult to interpret. Is it an automatic generated page for the iframe or is it the javascript code for the iframe aka the worker code?
This post was posted by Peachey88 (Flood), but signed as Jeblad.
The phrase "the real sandbox page" is dificult to interpret. Is it an automatic generated page for the iframe or is it the javascript code for the iframe aka the worker code?
This post was posted by Peachey88 (Flood), but signed as Jeblad.
I'm starting this project back up; following up on some old comments. :)
'the real sandbox page' here refers to the original HTML that appears in the iframe before we inject script code into it. 'real' here is to distinguish from a malicious attacker.
I like this idea very much. A few points:
Tl;dr JS in content, must have.
More:
sandbox
attribute eliminates risks of plugins, along with certain other risks.I'm starting this project back up; following up on some old comments. :)
There is a new iframe sandbox attribute that can be used to even further limit the code. There are also a blogpost at MSDN discussing this feature. Jeblad (talk) 15:36, 24 February 2012 (UTC)
I'm starting this project back up; following up on some old comments. :)
Yeah, looks like sandbox="allow-scripts"
may be what we want; disables some things but still allows scripting. I'll want to make sure that doesn't break the postMessage though...