mirror of
https://github.com/matrix-org/matrix-spec
synced 2026-03-07 04:04:10 +01:00
Speeeeeeling
Co-Authored-By: Andrew Morgan <1342360+anoadragon453@users.noreply.github.com>
This commit is contained in:
parent
865d3da0f8
commit
9e073e9647
|
|
@ -100,7 +100,7 @@ user so they don't get left out.
|
||||||
#### Displaying integration managers
|
#### Displaying integration managers
|
||||||
|
|
||||||
Clients simply open the `ui_url` (or equivalent) in an `iframe` or similar. In the current ecosystem,
|
Clients simply open the `ui_url` (or equivalent) in an `iframe` or similar. In the current ecosystem,
|
||||||
integration managers would receive a `scalar_token` to idenitify the user - this is no longer the case
|
integration managers would receive a `scalar_token` to identify the user - this is no longer the case
|
||||||
and instead integration managers must seek other avenues for determining the user ID. Other proposals
|
and instead integration managers must seek other avenues for determining the user ID. Other proposals
|
||||||
cover how to do this in the context of the integrations API.
|
cover how to do this in the context of the integrations API.
|
||||||
|
|
||||||
|
|
@ -159,7 +159,7 @@ Some things which may be desirable in the future are:
|
||||||
## Security considerations
|
## Security considerations
|
||||||
|
|
||||||
When displaying integration managers, clients should not trust that the input is sanitary. Per the
|
When displaying integration managers, clients should not trust that the input is sanitary. Per the
|
||||||
proposal above, an intergration manager is only permitted to be served from HTTP(S) URIs. A given
|
proposal above, an integration manager is only permitted to be served from HTTP(S) URIs. A given
|
||||||
integration manager can still have malicious intent however, and clients should ensure any sandboxing
|
integration manager can still have malicious intent however, and clients should ensure any sandboxing
|
||||||
on the manager is appropriate such that it can communicate with the client, but cannot perform
|
on the manager is appropriate such that it can communicate with the client, but cannot perform
|
||||||
unauthorized actions. Other URI schemes are just as dangerous and could potentially be allowed by
|
unauthorized actions. Other URI schemes are just as dangerous and could potentially be allowed by
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue