tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

commit f105a98c8da0241d1c4d5965b0b8de7e402deb8c
parent 4025c0521ee6330466c759027fd65edadef61c8b
Author: Bob Owen <bobowencode@gmail.com>
Date:   Mon,  3 Nov 2025 11:45:27 +0000

Bug 1996251 p3 - Enable USER_LOCKDOWN_WITH_TRAVERSE on content process sandbox on Nightly. r=yjuglaret

Differential Revision: https://phabricator.services.mozilla.com/D269976

Diffstat:
Mbrowser/app/profile/firefox.js | 4++++
1 file changed, 4 insertions(+), 0 deletions(-)

diff --git a/browser/app/profile/firefox.js b/browser/app/profile/firefox.js @@ -1561,7 +1561,11 @@ pref("browser.bookmarks.editDialog.maxRecentFolders", 7); // On windows these levels are: // See - security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp // SetSecurityLevelForContentProcess() for what the different settings mean. +#if defined(NIGHTLY_BUILD) + pref("security.sandbox.content.level", 9); +#else pref("security.sandbox.content.level", 8); +#endif // Pref controlling if messages relevant to sandbox violations are logged. pref("security.sandbox.logging.enabled", false);