-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Isn't this a huge security hole? #40
Comments
Not sure I understand the "security implications" that you're talking about. Can u please describe a possible exploit? |
I think that I see what you're talking about,. In case someone uses iframe X and then a malicious site uses this lib to read iframe X's localstorage. I guess it's fixable by limiting the onMessage to a known domain only. WDYT? |
Unfortunately #19 was never merged :/ |
As I can see. Why not? |
there were missing tests and conflicts that were not fixed. |
Sometimes it's a good idea to work together on a PR instead of just demanding the author to make all the changes you want. |
I agree |
It seems to me that anyone deploying the "magic iframe" onto their site allows anyone to read their local storage for that site. If that's the case, and no means of mitigation are provided, at the very least this should be expressed clearly at the top of the readme in large lettering to make users aware of the security implications of deploying this code.
The text was updated successfully, but these errors were encountered: