本文介绍了使用Office.js防止点击劫持的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

位于 https://github.com/OfficeDev/office-js-docs/blob/master/docs/develop/privacy-and-security.md#tips-to-prevent-clickjacking 通过让用户在执行潜在危险的操作之前进行确认,列出了一系列防止点击劫持的方法.

The documentation at https://github.com/OfficeDev/office-js-docs/blob/master/docs/develop/privacy-and-security.md#tips-to-prevent-clickjackinglists a bunch of ways to help prevent clickjacking, by having the user confirm before performing potentially dangerous actions.

我想知道在调用Office.initialize之前完全不呈现页面上的任何UI是否一样安全?还是攻击者可以通过某种方式在其页面上对我的加载项进行框架化,并以某种方式将Office SDK替换为恶意版本?

I was wondering if it would be just as safe to not render any UI on the page at all, until Office.initialize is called? Or is there a way for an attacker to iframe my add-in on their page and somehow replace the Office SDK with a malicious version?

推荐答案

是的,恶意攻击者可能试图模仿加载项运行时.最好确保用户确认最佳实践中所述的敏感动作.如果您的加载项要求用户登录,则这是获取有助于缓解的用户输入的一种方法.

Yes, a malicious attacker could attempt to emulate the add-in runtime. It is best to make sure the user confirms sensitive actions as described on the best practices. If your add-in requires the user to login, that is one way of getting user input that would help mitigate.

这篇关于使用Office.js防止点击劫持的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持!

07-23 18:49