-
-
Notifications
You must be signed in to change notification settings - Fork 42
Open
Description
Just spent today working on a sandboxing thing from a different angle before I found this. Turns out it's actually somewhat complementary!
- The
iframe.contentWindow.evaltrick does a great job preventing an untrusted script from messing with other people's object prototypes. - Combining
"use strict";with a silly closure trick it seems possible to prevent access to all global objects…except object literal prototypes!
You can take a look at what I got on this in https://github.com/natevw/evel/blob/master/evel.js#L49 — I do whitelist the ES5 globals because I assume most code should be allowed to expect them. I'll be the first to admit that masking every global every function call is kind of "not ideal" but AFAICT combining https://github.com/natevw/evel's tricks with this iframe stuff yields a fairly declawed environment.
Metadata
Metadata
Assignees
Labels
No labels