Tab Atkins Jr. (2013-08-22T05:22:32.000Z)
domenic at domenicdenicola.com (2013-08-29T19:15:32.922Z)
On Wed, Aug 21, 2013 at 5:55 PM, Mark S. Miller <erights at google.com> wrote: > This is an example of what I am worried about. Another is > > Object.create(p, {value: Promise}).Promise(....) > > where p is a promise. I'm not quite sure what this is supposed to do, because it's invalid Object.create. (Or rather, it creates a property named "value" with default descriptors, which I'm sure isn't intended.) > Perhaps it would help if, when we start to think "people can fool you > with..." it would help to substitute "an attacker can fool you with...". What exactly is the attack scenario being envisioned here, though? Okay, you can call a function and supply your own `this` value. And? You can always do this, before or after construction. I don't think this lets you fool anything, because you, the attacker, have to run your own code to make it happen. You can't somehow trick the defender into creating a tricky not-quite-authentic Promise, unless you've tricked them into using eval() or something. If the attacker is getting to run code of its choosing, you've already lost. Am I missing some obvious attack?