File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change 77 <link href="https://www.w3.org/StyleSheets/TR/2021/W3C-ED" rel="stylesheet">
88 <meta content="Bikeshed version 5edf5e459, updated Thu Jun 22 11:28:01 2023 -0700" name="generator">
99 <link href="https://www.w3.org/TR/webcodecs/" rel="canonical">
10- <meta content="d1ca4736e7fc6f9b712a3533d4386c1313c4e532 " name="document-revision">
10+ <meta content="6185cec02e54aa79409b97c7c402ef79d4572b94 " name="document-revision">
1111<style>
1212main > dl > dd {
1313 margin-bottom: 1em;
@@ -6630,7 +6630,7 @@ <h2 class="heading settled" data-level="12" id="security-considerations"><span c
66306630are provided and direct access to invoke the codec control methods. This also
66316631affords attackers the ability to invoke sequences of control methods that were
66326632not previously possible via the higher level APIs.</p>
6633- <p>User Agents <em class="rfc2119">SHOULD</em> mitigate this risk by extensively
6633+ <p>The Working Group expects User Agents to mitigate this risk by extensively
66346634fuzzing their implementation with random inputs and control method invocations.
66356635Additionally, User Agents are encouraged to isolate their underlying codecs in
66366636processes with restricted privileges (sandbox) as a barrier against successful
You can’t perform that action at this time.
0 commit comments