Skip to content

Commit 32b0a1a

Browse files
committed
fixup! mention new Module() supported and integrity approval
1 parent 058e7b5 commit 32b0a1a

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

doc/api/permissions.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -453,12 +453,14 @@ Additionally, import maps only work on `import` so it may be desirable to add a
453453
#### Guarantees
454454

455455
* The policies guarantee the file integrity when a module is loaded using
456-
`require()` or `import()`.
456+
`require()`, `import()` or `new Module()`.
457457
* Redirection does not prevent access to APIs through means such as direct
458-
access to `require.cache` or through `module.constructor` which allow access to
459-
loading modules. Policy redirection only affects specifiers to `require()` and
460-
`import`. Other means, such as to prevent undesired access to APIs through
461-
variables, are necessary to lock down that path of loading modules.
458+
access to `require.cache` which allow access to loaded modules.
459+
Policy redirection only affects specifiers to `require()` and
460+
`import`.
461+
* The approval of the module integrity in policies threat model implies
462+
they are allowed to muck with and even circumvent security features once
463+
loaded so environmental/runtime hardening is expected.
462464

463465
## Process-based permissions
464466

0 commit comments

Comments
 (0)