Skip to content

Commit 19ecae0

Browse files
committed
Updating store submission checklist to explictly call out the script injection not to be allowed
1 parent 5859c16 commit 19ecae0

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

docs/spfx/publish-to-marketplace-checklist.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,12 @@ Verify that your application can be installed in a specific site but also that i
105105

106106
If your application requires additional API access (for example to communicate with Microsoft Graph), it should request them in the solution manifest. Additionally, prepare justification for the requested API access as we might ask for it when reviewing your app.
107107

108+
### Supporting end users to inject scripts is not allowed
109+
110+
Your solution cannot enable end users to embed arbitrary scripts to SharePoint pages. This means that solutions which enable classic script editor or content editor scenarios in SharePoint are not allowed to be published to SharePoint Store.
111+
112+
This model is not allowed through the SharePoint Store as it opens security concerns by normal end users embedding scripts on the portal. You can only provide this kind of solution to customers outside fo the Microsoft hosted store.
113+
108114
### All URLs displayed in the web part must be working
109115

110116
If your web part shows URLs, they must be pointing to existing resources and must not lead to non-existent or error pages.
@@ -154,15 +160,15 @@ If your offering includes a free trial of your application, then your applicatio
154160

155161
### Don't include malicious code
156162

157-
Solutions that contain malicious code, links to malicious websites or otherwise illegal resources will be rejected from publishing in the Marketplace.
163+
Solutions that contain malicious code, link to malicious websites or otherwise illegal resources will be rejected from publishing in the Marketplace.
158164

159165
### Don't include vulnerable resource
160166

161167
Verify, that your code doesn't contain any vulnerabilities. If you're using third-party dependencies
162168

163169
### Ensure that your application doesn't use resources excessively
164170

165-
When testing your application, verify that it doesn't lead to noticeable or sustained increase in CPU usage, that it doesn't consume a lot of memory an that it doesn't lead to the browser becoming unresponsive. In general, your application should run well on an average desktop computer with internet access. Also, it shouldn't take longer than 10 seconds for your application to load.
171+
When testing your application, verify that it doesn't lead to noticeable or sustained increase in CPU usage, that it doesn't consume a lot of memory and that it doesn't lead to the browser becoming unresponsive. In general, your application should run well on an average desktop computer with internet access. Also, it shouldn't take longer than 10 seconds for your application to load.
166172

167173
### Microsoft Teams targeted solutions will need to be tenant scoped
168174

0 commit comments

Comments
 (0)