Serious Discussion "Fixing" Manifest V3


Level 83
Thread author
Top Poster
Mar 29, 2018

Wed 07 February 2024
In the previous post of this series, What is Manifest v3 and how it affects JShelter, we've stressed the limitations of the new WebExtensions APIs, along with the challenges and the threats it poses to privacy and security extensions such as JShelter.
As part of our strategy to mitigate these problems, we mentioned "actively participating in the ongoing /browser extensions API design work/ of the Web Extensions Community Group (WECG), to steer the MV3 specification in the most favorable direction for security and privacy use cases".
Here, we want to provide some updates about these design participation activities, and pointers to follow their progress.
Specifically, we prompted the W3C's WECG to resume the discussion of the two main issues "blocking" JShelter, which we had originally opened more than 2 years ago:
  1. Scripting API minimum requirements to enable the reliable and pervasive script injection needed to enforce JShelter's JavaScript Shield wrappers
  2. LAN-aware Declarative Net Request filters, required for the Network Boundary Shield to operate in Chromium-derived browsers and Safari on MV3
See public notes of the meetings of the WECG for more details on the working of the group.
This time, the response has been unanimously positive on #1, and generally positive on #2, with Google expressing a neutral position motivated by Chromium developers unsure if the Network Boundary Shield use case would be better served by a built-in browser UI around their (not ready for prime time yet and planned for quite a long time now) Private Network Access.
The discussion continues on the specific follow-up proposals we've created afterwards, covering all our JavaScript Shield requirements:
  1. Proposal: RegisteredContentScript.func and RegisteredContentScript.args (similar to ScriptInjection)
  2. Proposal: RegisteredContentScript.workers property to inject WorkerScope(s)
  3. Proposal: Proposal: RegisteredContentScript.tabIds and RegisteredContentScript.excludeTabIds properties to filter injection
Furthermore MAIN world support in Firefox would greatly simplify our cross-browser story, allowing us to drop a complex and fragile compatibility layer working around Firefox's XRay vision approach to "safe" DOM / JavaScript environment manipulation that we currently employ in Jshelter for Firefox.
Browser vendors now signalling adequate understanding of our requirements and their will to implement our API proposals or equivalent alternatives before MV2 sunset can finally induce some cautious optimism about a reasonably better MV3 for privacy and security extensions.
This post is part 2 of the "Manifest v3" series:

  1. What is Manifest v3 and how it affects JShelter
  2. "Fixing" Manifest V3

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.