Confirmed users, Bureaucrats and Sysops emeriti
2,088
edits
| Line 60: | Line 60: | ||
* Include a thorough description of the security assumptions, capabilities and any potential risks (possible attack points) being introduced by your project. | * Include a thorough description of the security assumptions, capabilities and any potential risks (possible attack points) being introduced by your project. | ||
** Assumptions | ** Assumptions | ||
*** bookmarks.html is pure | |||
*** places.sqlite is being written to only by our application | |||
** Capabilities | ** Capabilities | ||
** Potential Risks | ** Potential Risks | ||
*** Favicons | |||
*** Bookmarklets | |||
*** Place URIs | |||
*** Script in keywords, descriptions, titles, etc | |||
== Exported APIs == | == Exported APIs == | ||