Skip to content

Commit 2a680ac

Browse files
committed
chore: use latest WoT Security document instead of custom reference
1 parent 7bfa2ea commit 2a680ac

File tree

1 file changed

+6
-12
lines changed

1 file changed

+6
-12
lines changed

index.html

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -55,12 +55,6 @@
5555
"ecmascript", "streams",
5656
"wot-architecture11", "wot-thing-description11", "wot-binding-templates"],
5757
localBiblio: {
58-
"WOT-SECURITY" : {
59-
href: "https://www.w3.org/TR/2019/NOTE-wot-security-20191106/",
60-
title: "Web of Things (WoT) Security and Privacy Guidelines",
61-
publisher: "W3C",
62-
date: "6 November 2019"
63-
},
6458
"WOT-USE-CASES" : {
6559
href:"https://www.w3.org/TR/2022/NOTE-wot-usecases-20220307/",
6660
title: "Web of Things (WoT): Use Cases and Requirements",
@@ -4074,13 +4068,13 @@ <h3>Discovery Examples</h3>
40744068
<section> <h2 id="security">Security and Privacy</h2>
40754069
<p>
40764070
A detailed discussion of security and privacy considerations for the Web of Things, including a threat model that can be adapted to various circumstances, is
4077-
presented in the informative document [[!WOT-SECURITY]].
4071+
presented in the informative document [[!wot-security]].
40784072
This section discusses only security and privacy risks and possible mitigations
40794073
directly relevant to the scripts and WoT Scripting API.
40804074
</p>
40814075
<p>
40824076
A suggested set of best practices to improve security for WoT devices and
4083-
services has been documented in [[!WOT-SECURITY]].
4077+
services has been documented in [[!wot-security]].
40844078
That document may be updated as security measures evolve.
40854079
Following these practices does not guarantee security,
40864080
but it might help avoid commonly known vulnerabilities.
@@ -4122,7 +4116,7 @@ <h3>Corrupted Input Security and Privacy Risk</h3>
41224116
using WoT interface it exposes.
41234117
</p>
41244118
<dl><dt>Mitigation:</dt><dd>
4125-
Implementors of this API SHOULD perform validation on all script inputs. In addition to input validation, <a href="https://en.wikipedia.org/wiki/Fuzzing">fuzzing</a> should be used to verify that the input processing is done correctly. There are many tools and techniques in existence to do such validation. More details can be found in [[!WOT-SECURITY]].
4119+
Implementors of this API SHOULD perform validation on all script inputs. In addition to input validation, <a href="https://en.wikipedia.org/wiki/Fuzzing">fuzzing</a> should be used to verify that the input processing is done correctly. There are many tools and techniques in existence to do such validation. More details can be found in [[!wot-security]].
41264120
</dd></dl>
41274121
</section>
41284122

@@ -4151,7 +4145,7 @@ <h3>Provisioning and Update Security Risk</h3>
41514145
Post-manufacturing provisioning or update of scripts,
41524146
WoT Scripting Runtime or any related data should be done in a secure fashion.
41534147
A set of recommendations for secure update and post-manufacturing
4154-
provisioning can be found in [[!WOT-SECURITY]].
4148+
provisioning can be found in [[!wot-security]].
41554149
</dd></dl>
41564150
</section>
41574151

@@ -4180,7 +4174,7 @@ <h3>Corrupted Script Input Security and Privacy Risk</h3>
41804174
A script instance may receive data formats defined by the TD, or data formats defined by the applications. While the WoT Scripting Runtime SHOULD perform validation on all input fields defined by the TD, scripts may be still exploited by input data.
41814175
</p>
41824176
<dl><dt>Mitigation:</dt><dd>
4183-
Script developers should perform validation on all application defined script inputs. In addition to input validation, <a href="https://en.wikipedia.org/wiki/Fuzzing">fuzzing</a> could be used to verify that the input processing is done correctly. There are many tools and techniques in existence to do such validation. More details can be found in [[!WOT-SECURITY]].
4177+
Script developers should perform validation on all application defined script inputs. In addition to input validation, <a href="https://en.wikipedia.org/wiki/Fuzzing">fuzzing</a> could be used to verify that the input processing is done correctly. There are many tools and techniques in existence to do such validation. More details can be found in [[!wot-security]].
41844178
</dd></dl>
41854179
</section>
41864180

@@ -4192,7 +4186,7 @@ <h3>Denial of Service (DoS) Security Risk</h3>
41924186
<dl><dt>Mitigation:</dt><dd>
41934187
Scripts should avoid heavy functional processing without prior successful
41944188
authentication of requestor. The set of recommended authentication mechanisms
4195-
can be found in [[!WOT-SECURITY]].
4189+
can be found in [[!wot-security]].
41964190
</dd></dl>
41974191
</section>
41984192

0 commit comments

Comments
 (0)