blob: 399e341594fc8635d7c2844fa85cfa5b15352c61 [file] [log] [blame] [view]
Adrian Taylorb8d6a2d2021-11-10 06:38:401# Security rules
2
3This is a list of the security policies Chromium has published.
4
5* [Rule of Two](rule-of-2.md) - don't handle untrustworthy data in the browser
6 process in an unsafe language
7* [The browser process should not handle messages from web
8 content](handling-messages-from-web-content.md)
9* [Behavior should be part of Chrome's binaries or delivered via component
10 updater](behavior-over-the-internet.md) rather than delivered dynamically
11* Rules for [Android IPC](android-ipc.md)
12* [Always assume a compromised renderer](compromised-renderers.md)
13* [Use origin not URL for security decisions](origin-vs-url.md)
14* [Controlling access to powerful web platform
15 features](permissions-for-powerful-web-platform-features.md)
Emily Stark890170f2022-12-01 03:16:3116* [Security considerations for browser UI](security-considerations-for-browser-ui.md)
Adrian Taylorddafac02023-05-10 16:53:5217* [Guidelines for URL display](url_display_guidelines/url_display_guidelines.md)
Charlie Reis28887a572023-10-06 23:15:5418* [Avoid adding cross-origin full-page overlays](overlay-policy.md)
Adrian Taylorb8d6a2d2021-11-10 06:38:4019
20You can also find our position on various matters in the [security FAQ](faq.md):
21for example, on local attackers or on the privilege accorded to enterprise
22admins.