Skip to content
This repository was archived by the owner on Apr 12, 2024. It is now read-only.

Commit 9e8a687

Browse files
rodyhaddadpetebacondarwin
authored andcommitted
chore(security): add warning banner to top of security sensitive files
1 parent 3613a60 commit 9e8a687

File tree

5 files changed

+55
-0
lines changed

5 files changed

+55
-0
lines changed

src/jqLite.js

+11
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,16 @@
11
'use strict';
22

3+
/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
4+
* Any commits to this file should be reviewed with security in mind. *
5+
* Changes to this file can potentially create security vulnerabilities. *
6+
* An approval from 2 Core members with history of modifying *
7+
* this file is required. *
8+
* *
9+
* Does the change somehow allow for arbitrary javascript to be executed? *
10+
* Or allows for someone to change the prototype of built-in objects? *
11+
* Or gives undesired access to variables likes document or window? *
12+
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
13+
314
/* global JQLitePrototype: true,
415
addEventListenerFn: true,
516
removeEventListenerFn: true,

src/ng/compile.js

+11
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,16 @@
11
'use strict';
22

3+
/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
4+
* Any commits to this file should be reviewed with security in mind. *
5+
* Changes to this file can potentially create security vulnerabilities. *
6+
* An approval from 2 Core members with history of modifying *
7+
* this file is required. *
8+
* *
9+
* Does the change somehow allow for arbitrary javascript to be executed? *
10+
* Or allows for someone to change the prototype of built-in objects? *
11+
* Or gives undesired access to variables likes document or window? *
12+
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
13+
314
/* ! VARIABLE/FUNCTION NAMING CONVENTIONS THAT APPLY TO THIS FILE!
415
*
516
* DOM-related variables:

src/ng/parse.js

+11
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,16 @@
11
'use strict';
22

3+
/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
4+
* Any commits to this file should be reviewed with security in mind. *
5+
* Changes to this file can potentially create security vulnerabilities. *
6+
* An approval from 2 Core members with history of modifying *
7+
* this file is required. *
8+
* *
9+
* Does the change somehow allow for arbitrary javascript to be executed? *
10+
* Or allows for someone to change the prototype of built-in objects? *
11+
* Or gives undesired access to variables likes document or window? *
12+
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
13+
314
var $parseMinErr = minErr('$parse');
415

516
// Sandboxing Angular Expressions

src/ng/sce.js

+11
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,16 @@
11
'use strict';
22

3+
/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
4+
* Any commits to this file should be reviewed with security in mind. *
5+
* Changes to this file can potentially create security vulnerabilities. *
6+
* An approval from 2 Core members with history of modifying *
7+
* this file is required. *
8+
* *
9+
* Does the change somehow allow for arbitrary javascript to be executed? *
10+
* Or allows for someone to change the prototype of built-in objects? *
11+
* Or gives undesired access to variables likes document or window? *
12+
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
13+
314
var $sceMinErr = minErr('$sce');
415

516
var SCE_CONTEXTS = {

src/ngSanitize/sanitize.js

+11
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,16 @@
11
'use strict';
22

3+
/* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
4+
* Any commits to this file should be reviewed with security in mind. *
5+
* Changes to this file can potentially create security vulnerabilities. *
6+
* An approval from 2 Core members with history of modifying *
7+
* this file is required. *
8+
* *
9+
* Does the change somehow allow for arbitrary javascript to be executed? *
10+
* Or allows for someone to change the prototype of built-in objects? *
11+
* Or gives undesired access to variables likes document or window? *
12+
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
13+
314
var $sanitizeMinErr = angular.$$minErr('$sanitize');
415

516
/**

0 commit comments

Comments
 (0)