Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove MIME types from mandatory data list that are not supported by all browsers. #155

Merged
merged 4 commits into from
Oct 14, 2021
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
30 changes: 0 additions & 30 deletions index.bs
Original file line number Diff line number Diff line change
Expand Up @@ -546,36 +546,6 @@ urlPrefix: https://w3c.github.io/FileAPI/#dfn-; type: dfn;
attempt to exploit security vulnerabilities in local software by placing
data known to trigger those vulnerabilities on the clipboard.

<h3 id="optional-data-types">Optional data types</h3>

The implementation must recognize the native OS clipboard format description
for the following data types, to be able to populate the
{{DataTransferItemList}} with the correct description for paste events, and
set the correct data format on the OS clipboard in response to copy and cut
events.

<h4 id="reading-from-clipboard-x">Reading from the clipboard</h4>

These data types may be exposed by <em>paste</em> events if a
corresponding native type exists on the clipboard:

* text/uri-list
* image/svg+xml

<h4 id="writing-to-clipboard-x">Writing to the clipboard</h4>

These data types may be placed on the clipboard with a corresponding
native type description if added to a {{DataTransfer}} object during
<em>copy</em> and <em>cut</em> events.

* text/uri-list
* image/svg+xml

Advisement: Warning! The data types that untrusted scripts are allowed to write to the
clipboard are limited as a security precaution. Untrusted scripts can
attempt to exploit security vulnerabilities in local software by placing
data known to trigger those vulnerabilities on the clipboard.


<h2 id="async-clipboard-api">Asynchronous Clipboard API</h2>

Expand Down