Security and Privacy questionnaire responses for the Cookie Store API
No.
Yes.
No.
This specification offers high-performance methods for accessing HTTP cookies, which have already become an established part of the Web platform. No new state mechanism is introduced.
Yes. However, it does not expose any new persistent cross-origin state.
This specification defers to
RFC 6265bis for
the storage and security models of HTTP cookies. Cookies can be scoped to an
entire eTLD+1, transcending the same origin policy. For eaxmple, a cookie
whose
domain
attribute is set to example.com
is visible to www.example.com
and
foo.example.com
.
document.cookie
already exposes HTTP cookies. This specification does not open up access to
cookies past what document.cookie
has to offer.
No.
No.
No.
No.
No.
No.
No.
No.
No.
This specification defers to RFC 6265bis for the storage and security models of HTTP cookies. Cookies have a SameSite attribute that introduces differences in behavior between first-party and third-party contexts.
This specification includes a method for accessing a cookie’s SameSite attribute.
This specification builds on top of HTTP cookies as defined in RFC 6265bis. The specification should be compatible with any manner user agents choose to handle cookies in “incognito”.
Yes. However, it does not introduce any new persistence mechanism.
No.
The specification will defer to RFC 6265bis for its extensive treatment of Security and Privacy issues.
No.