Skip to content

Commit 206df62

Browse files
Merge pull request #691 from w3c/chrisn-fix-should
SHA: 6185cec Reason: push, by Djuffin Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
1 parent c3e1c98 commit 206df62

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

index.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
<link href="https://www.w3.org/StyleSheets/TR/2021/W3C-ED" rel="stylesheet">
88
<meta content="Bikeshed version 5edf5e459, updated Thu Jun 22 11:28:01 2023 -0700" name="generator">
99
<link href="https://www.w3.org/TR/webcodecs/" rel="canonical">
10-
<meta content="d1ca4736e7fc6f9b712a3533d4386c1313c4e532" name="document-revision">
10+
<meta content="6185cec02e54aa79409b97c7c402ef79d4572b94" name="document-revision">
1111
<style>
1212
main > dl > dd {
1313
margin-bottom: 1em;
@@ -6630,7 +6630,7 @@ <h2 class="heading settled" data-level="12" id="security-considerations"><span c
66306630
are provided and direct access to invoke the codec control methods. This also
66316631
affords attackers the ability to invoke sequences of control methods that were
66326632
not previously possible via the higher level APIs.</p>
6633-
<p>User Agents <em class="rfc2119">SHOULD</em> mitigate this risk by extensively
6633+
<p>The Working Group expects User Agents to mitigate this risk by extensively
66346634
fuzzing their implementation with random inputs and control method invocations.
66356635
Additionally, User Agents are encouraged to isolate their underlying codecs in
66366636
processes with restricted privileges (sandbox) as a barrier against successful

0 commit comments

Comments
 (0)