TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Javascript security

16 点作者 tonyskn超过 14 年前

3 条评论

joubert超过 14 年前
I think it would be better to not conflate language and runtime issues. For example, one can improve language misfeatures such as semicolon insertion, lack of built-in name pacing, etc. Even when you improved this, you would still want to improve the (browser + DOM) architecture/runtime, but in many cases these are orthogonal concerns.
DjDarkman超过 14 年前
The global scope thing is not entierly true, you can use closures to minimize the global scope usage.<p>The problem is not that bad: - on the server side, always sanitize user input - only put script tags from places you trust
jgrahamc超过 14 年前
Since this old presentation of mine has resurfaced (first on Reddit and now here), here's the comment I made on Reddit:<p><pre><code> A good companion to this presentation is Douglas Crockford's presentation on JavaScript security: http://javascript.crockford.com/security.ppt (Warning: PowerPoint). He makes similar points about the security of JavaScript and comes up with a different solution. He proposes doing away with most of JavaScript and allowing only a safe-subset of the language to be used." </code></pre> As a follow-up I had proposed signing of &#60;SCRIPT&#62; tags: <a href="http://blog.jgc.org/2009/09/solving-xss-problem-by-signing-tags.html" rel="nofollow">http://blog.jgc.org/2009/09/solving-xss-problem-by-signing-t...</a>
评论 #2158250 未加载
评论 #2158190 未加载
评论 #2158167 未加载