File tree 1 file changed +2
-2
lines changed 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change 7
7
<link href="https://www.w3.org/StyleSheets/TR/2021/W3C-ED" rel="stylesheet">
8
8
<meta content="Bikeshed version 5edf5e459, updated Thu Jun 22 11:28:01 2023 -0700" name="generator">
9
9
<link href="https://www.w3.org/TR/webcodecs/" rel="canonical">
10
- <meta content="d1ca4736e7fc6f9b712a3533d4386c1313c4e532 " name="document-revision">
10
+ <meta content="6185cec02e54aa79409b97c7c402ef79d4572b94 " name="document-revision">
11
11
<style>
12
12
main > dl > dd {
13
13
margin-bottom: 1em;
@@ -6630,7 +6630,7 @@ <h2 class="heading settled" data-level="12" id="security-considerations"><span c
6630
6630
are provided and direct access to invoke the codec control methods. This also
6631
6631
affords attackers the ability to invoke sequences of control methods that were
6632
6632
not previously possible via the higher level APIs.</p>
6633
- <p>User Agents <em class="rfc2119">SHOULD</em> mitigate this risk by extensively
6633
+ <p>The Working Group expects User Agents to mitigate this risk by extensively
6634
6634
fuzzing their implementation with random inputs and control method invocations.
6635
6635
Additionally, User Agents are encouraged to isolate their underlying codecs in
6636
6636
processes with restricted privileges (sandbox) as a barrier against successful
You can’t perform that action at this time.
0 commit comments