-
- Add a nice things section to mention stuff like same-site cookies default rollout, same-site cookies bypasses, and other interesting stuff related to XS-Leaks, CTF challenges with XS-Leaks
-
List of interesting topics about XS-Leaks that might be a good starting point to someone interested in researching new attacks/defenses/bypasses.
-
Some XS-Leaks are not state-dependent and can be used to leak information about internal networks, for example, with [port scanning](https://portswigger.net/research/exposing-intranets-with-reliable-b…
-
Should we include requirements for compression based side-channel attacks in general and BREACH (which is still alive and well as far as I know) in particular?
Options:
* general requirement
* …
-
Context: https://jorianwoltjer.com/blog/p/hacking/xs-leaking-flags-with-css-a-ctfd-0day
This issue is somewhat separate from the privacy leaks that we've been thinking of, but it's an interesting g…
-
Size Leaks are very important XS-Leaks. They are often addressed in the browser when researchers find exact ways to leak the size. Some mechanisms that still work:
- [Cache Timing](https://github.c…
-
Hi. I tried this library out to do some transforms and seem to be hitting a large memory leak.
I'm running frequent transforms and memory seems to be increasing each transform in an unbounded way. …
-
The problem has not disappeared anywhere, 2 years ago and now the same thing. Visually, through the task manager in the past there was an information leak, and the process was constantly increasing in…
-
Hello all,
I have come across various minor memory leaks and a major one when using closures. It's been a while since I've used XS and there are things I don't understand so I wanted to run through…
-
# Bug Report
### 🔎 Search Terms
- type inference const string
- type inference generic constraints
### 🕗 Version & Regression Information
Tested on
- 3.9.7
- 4.2.3
- 4.3.0-beta
### ⏯ …