-
Notifications
You must be signed in to change notification settings - Fork 2.7k
Closed
Labels
electronissues related to the electron targetissues related to the electron targethelp wantedissues meant to be picked up, require helpissues meant to be picked up, require helpsecurityissues related to securityissues related to security
Description
The security recommendations from electron outline best practice for securing the main process from malicious attacks in the renderer process. As electron is a little way behind chromium releases, known security holes may be publicised long before theia users receive updates to their apps. This is especially relevant if theia ever loads remote content.
Have these guidelines been considered in the design of theia and is there interest in applying them?
For example, I would recommend adding webPreferences
to the BrowserWindow
options for these items:
nodeIntegration: false
to prevent malicious code from running node functionality from the rendererpreload
to control the exact functionality and APIs available to the renderer process from the main process. This could simply be restricted to the IPC interfaces
This may have an impact on how electron-browser
modules access the main electron process, however and require some re-architecture. I'm happy to propose a PR if this is agreed as being needed.
paul-marechal, marcdumais-work and csomeonekittaakos and JonasHelming
Metadata
Metadata
Assignees
Labels
electronissues related to the electron targetissues related to the electron targethelp wantedissues meant to be picked up, require helpissues meant to be picked up, require helpsecurityissues related to securityissues related to security