W3C: "Service workers create the opportunity for a bad actor to turn a bad day into a bad eternity."[1] With service workers, cross-site scripting vulnerabilities are forever.<p>Service workers install by drive-by, which is troubling. In Firefox, check "about:serviceworkers" to see what you have installed. Take a look. You probably have far more service workers active than you thought. There are supposed to be enough cross-site scripting restrictions to keep service workers contained to their origin domain, but some holes have been found. There was a successful service worker attack on Dropbox, since fixed. "If you run a site that serves user files with secret URLs from a shared domain, you need to look out for the Service-Worker: script HTTP header; if you see it, run for the hills."[2]<p>If an attacker can get one page loaded from a site being attacked, they then own all traffic between the user and the site. This has lots of attack potential.<p>[1] <a href="https://www.w3.org/TR/service-workers/#security-considerations" rel="nofollow">https://www.w3.org/TR/service-workers/#security-consideratio...</a>
[2] <a href="https://alf.nu/ServiceWorker" rel="nofollow">https://alf.nu/ServiceWorker</a>