Skip to content

Migrate from JS injection on the page to a full fledged XPCOM component #7

@crankycoder

Description

@crankycoder

The Firefox security team has indicated that there are numerous and ongoing new attacks based on JS injection.

We can avoid all these issues by exporting an XPCOM component and registering a "@mozilla.org/geolocation;1" component and intercepting all the calls to it.

The last component to register the ClassID wins - so in our case - as an addon, we'd end up clobbering the built in mozilla.org/geolocation;1 component and be the 'real' geolocation provider.

Relevant MDN documentation to build an XPCOM component: https://developer.mozilla.org/en-US/Add-ons/SDK/Low-Level_APIs/platform_xpcom

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions