Simon Pieters

Web standards engineer @mozilla@mozilla.social
✍️ htmlparser.info & wpc.guide

Simon Pieters boosted:
2025-09-19

Intutively for a DOM Sanitizer configuration that looks like the following:

{
elements: ["div", "span"],
attributes: ["class"],
}

For a <div> element, which attributes do you think should/would be allowed?

(Boost appreciated)

Simon Pieters boosted:
2025-09-18

Just published: "The Web's Most Tolerated Feature" by @jugglinmike bocoup.com/blog/the-webs-most-

Simon Pieterszcorpan
2025-08-27
Simon Pieters boosted:
2025-08-19

⚠️ Last chance to fill out #StateOfHTML 2025 and get browsers to pay attention to your web platform pain points!

After popular demand, the survey closing date has been extended for a few more days so that returning OOO folks get a chance to fill it out too!

survey.devographics.com/en-US/

Simon Pieterszcorpan
2025-06-25
Simon Pieterszcorpan
2025-06-23

@securitymb Right. But script and style are actual SVG elements so those are likely most risky compat-wise.

Elements or character references or CDATA sections, or even comments.

Simon Pieterszcorpan
2025-06-18

@asuh @keithamus @bramus can you expand on why widows & orphans? Do you want them for print or multicol?

Simon Pieters boosted:
2025-06-16

If you use "AI agents" (LLMs calling tools in a loop) you need to be aware of the Lethal Trifecta

Any time you combine access to private data, exposure to untrusted content and the ability to externally communicate an attacker can trick the system into stealing your data simonwillison.net/2025/Jun/16/

Simon Pieterszcorpan
2025-06-16

@securitymb

> While there’s currently no proposal that addresses this issue, the Google Information Security Engineering team is planning to explore options to fix this vector as well.

Let's do it. I've written about improving consistency in parsing before: x.com/zcorpan/status/133951714

Although making SVG style and script tokenize like HTML doesn't necessarily solve mXSS, it seems like an improvement. Removing the scripting enabled check for noscript is another, but it would break the feature.

Simon Pieters boosted:
Michał Bentkowski (@SecurityMB) 🦻securitymb@infosec.exchange
2025-06-16

Today we published two blog posts about an HTML specification change that makes mutation XSS harder to exploit! Long story short: `<` and `>` are now escaped in attributes.

* Blog post about security rationale behind this change: bughunters.google.com/blog/503
* Blog post about how it affects web developers: developer.chrome.com/blog/esca

Simon Pieters boosted:
Cure53 🏳️‍🌈cure53@infosec.exchange
2025-06-03

Remember this tiny change to the HTML spec?

It just prevented a critical bug in an application we are currently testing.

github.com/whatwg/html/commit/

❤️ cc @freddy @securitymb

Simon Pieterszcorpan
2025-06-03
Simon Pieterszcorpan
2025-04-25

@bkardell @Schepp @timsev @Kilian @keithamus there was pushback to implement the a11y mapping in 2014, see w3.org/Bugs/Public/show_bug.cg

In 2019, Firefox implemented (in Nightly only) the outline algorithm and found that it regressed usability for various existing content:
github.com/whatwg/html/pull/34
bugzilla.mozilla.org/show_bug.

That I think was the nail in the coffin for the outline algorithm.

Simon Pieterszcorpan
2025-04-11

@eeeps thank you or thank you

Simon Pieterszcorpan
2025-04-11

I wrote an article that was #1 on the orange website for a bit earlier today

news.ycombinator.com/item?id=4

Simon Pieterszcorpan
2025-03-27

Starting March 31, 50% of Firefox beta 138 users will have the change where <h1> always has the same UA style, even in article, aside, nav, section.

Also, Lighthouse will fail a check if you have an <h1> without font-size specified.

Advice for web developers: developer.mozilla.org/en-US/do

Context: mastodon.social/@zcorpan/11383

Simon Pieterszcorpan
2025-03-04

@eeeps @johannes it seems possible. Though changing object-fit would need to be a relevant mutation. File an issue 🙂

Simon Pieters boosted:
2025-02-24

Last week I did a little talk on the brand new command&commandfor attributes! And you can watch it right here:

londonwebstandards.org/talks/e

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst