Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Call stacks in crash reports from unresponsive web pages #981

Closed
1 task done
issackjohn opened this issue Aug 13, 2024 · 1 comment
Closed
1 task done

Call stacks in crash reports from unresponsive web pages #981

issackjohn opened this issue Aug 13, 2024 · 1 comment
Labels
Focus: Privacy (pending) Mode: breakout Work done during a time-limited breakout session Resolution: satisfied with concerns The TAG is satisfied with this work overall but requires changes Topic: privacy Venue: Web Performance WG Venue: WICG

Comments

@issackjohn
Copy link

issackjohn commented Aug 13, 2024

こんにちは TAG-さん!

I'm requesting a TAG review of Call stacks in crash reports from unresponsive web pages.

When a web page becomes unresponsive, it's often because of JavaScript code which is busy running an infinite loop or other very long computation. When a developer receives a report from the crash reporting API, and the reason is unresponsive, it would be very helpful to include the JS call stack from when the page was deemed unresponsive. This would let the website developer more easily find the find and fix the problem. What happens instead? The page reports that it was terminated due to being unresponsive, but the developer of the page has no further information about how to fix the problem.

Further details:

  • I have reviewed the TAG's Web Platform Design Principles
  • Relevant time constraints or deadlines:
  • The group where the work on this specification is currently being done: WICG Crash Reporting
  • The group where standardization of this work is intended to be done (if current group is a community group or other incubation venue): W3C Web Performance WG
  • Major unresolved issues with or opposition to this specification: N/A
  • This work is being funded by:

You should also know that...


@jyasskin
Copy link
Contributor

This looks like a worthwhile piece of information to show to developers. We agree with the privacy worries that these uploads might expose what extensions a user is running. We suspect this privacy risk is avoidable in two ways: First, you could automatically omit stacks if any extensions have injected content scripts. Second, you could prompt the user about whether they want to send the report, with a user-comprehensible explanation of what sensitive information's likely to be sent: for example the list of extensions that injected script.

Please continue discussing this in the WebPerf working group and the PING.

@jyasskin jyasskin added Topic: privacy Venue: Web Performance WG Resolution: satisfied with concerns The TAG is satisfied with this work overall but requires changes and removed Progress: awaiting consensus labels Sep 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Focus: Privacy (pending) Mode: breakout Work done during a time-limited breakout session Resolution: satisfied with concerns The TAG is satisfied with this work overall but requires changes Topic: privacy Venue: Web Performance WG Venue: WICG
Projects
None yet
Development

No branches or pull requests

3 participants