On Sep 4, 2014 5:04 PM, "Dave Watts" wrote:
> This is exactly how user scripts work. They are installed by the user
> in some fashion, and can control browser functionality. This is how
> online password managers work, how Greasemonkey works, etc, etc, etc.
> If a user installs malware, of course that malware can do this sort of
> thing. There's nothing magically sacrosanct in HTTP or HTML to prevent
> this sort of thing.

A Content Security Policy that blocks inline scripts will block some local
malware too. It may for instance block bookmarklets, but not Greasemonkey.

Jochem


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:359240
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm

Reply via email to