File tree Expand file tree Collapse file tree 1 file changed +3
-7
lines changed Expand file tree Collapse file tree 1 file changed +3
-7
lines changed Original file line number Diff line number Diff line change @@ -748,9 +748,9 @@ anElement.innerHTML = trustedTypes.emptyHTML; // no need to create a policy
748
748
: <dfn>emptyScript</dfn>
749
749
:: is a {{TrustedScript}} object with its [=TrustedScript/data=] value set to an empty string.
750
750
751
- Note: This object can be used to detect if the runtime environment has [[#csp-eval]] . While native Trusted Types implementation can
752
- support `eval(TrustedScript)`, it is impossible for a polyfill to emulate that, as
753
- eval(TrustedScript) will return its input without unwrapping and evaluating the code.
751
+ Note: This object can be used to detect if the runtime environment has support for dynamic code compilation.
752
+ While native Trusted Types implementation can support `eval(TrustedScript)`, it is impossible for a polyfill to
753
+ emulate that, as eval(TrustedScript) will return its input without unwrapping and evaluating the code.
754
754
755
755
<div class="example" id="empty-script-example">
756
756
<xmp highlight="js">
@@ -1483,10 +1483,6 @@ strings (|createdPolicyNames|), this algorithm returns `"Blocked"` if the
1483
1483
`"Blocked"`.
1484
1484
1. Return |result|.
1485
1485
1486
- ### Support for dynamic code compilation ### {#csp-eval}
1487
-
1488
- Note: See [https://github.com/w3c/webappsec-csp/pull/659] (https://github.com/w3c/webappsec-csp/pull/659) which upstreams this integration.
1489
-
1490
1486
# Security Considerations # {#security-considerations}
1491
1487
1492
1488
Trusted Types are not intended to protect access to [=injection sinks=] in an
You can’t perform that action at this time.
0 commit comments