commit f105a98c8da0241d1c4d5965b0b8de7e402deb8c
parent 4025c0521ee6330466c759027fd65edadef61c8b
Author: Bob Owen <bobowencode@gmail.com>
Date: Mon, 3 Nov 2025 11:45:27 +0000
Bug 1996251 p3 - Enable USER_LOCKDOWN_WITH_TRAVERSE on content process sandbox on Nightly. r=yjuglaret
Differential Revision: https://phabricator.services.mozilla.com/D269976
Diffstat:
1 file changed, 4 insertions(+), 0 deletions(-)
diff --git a/browser/app/profile/firefox.js b/browser/app/profile/firefox.js
@@ -1561,7 +1561,11 @@ pref("browser.bookmarks.editDialog.maxRecentFolders", 7);
// On windows these levels are:
// See - security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp
// SetSecurityLevelForContentProcess() for what the different settings mean.
+#if defined(NIGHTLY_BUILD)
+ pref("security.sandbox.content.level", 9);
+#else
pref("security.sandbox.content.level", 8);
+#endif
// Pref controlling if messages relevant to sandbox violations are logged.
pref("security.sandbox.logging.enabled", false);