@@ -1494,12 +1494,14 @@ public void setPictureListener(PictureListener listener) {
14941494 * Injects the supplied Java object into this WebView. The object is
14951495 * injected into the JavaScript context of the main frame, using the
14961496 * supplied name. This allows the Java object's methods to be
1497- * accessed from JavaScript. For API level {@link android.os.Build.VERSION_CODES#JELLY_BEAN_MR1}
1497+ * accessed from JavaScript. For applications targeted to API
1498+ * level {@link android.os.Build.VERSION_CODES#JELLY_BEAN_MR1}
14981499 * and above, only public methods that are annotated with
14991500 * {@link android.webkit.JavascriptInterface} can be accessed from JavaScript.
1500- * For API level {@link android.os.Build.VERSION_CODES#JELLY_BEAN} or below,
1501+ * For applications targeted to API level {@link android.os.Build.VERSION_CODES#JELLY_BEAN} or below,
15011502 * all public methods (including the inherited ones) can be accessed, see the
1502- * important security note below for implications. Note that injected objects will not
1503+ * important security note below for implications.
1504+ * <p> Note that injected objects will not
15031505 * appear in JavaScript until the page is next (re)loaded. For example:
15041506 * <pre>
15051507 * class JsObject {
@@ -1514,7 +1516,7 @@ public void setPictureListener(PictureListener listener) {
15141516 * <ul>
15151517 * <li> This method can be used to allow JavaScript to control the host
15161518 * application. This is a powerful feature, but also presents a security
1517- * risk for applications targeting API level
1519+ * risk for applications targeted to API level
15181520 * {@link android.os.Build.VERSION_CODES#JELLY_BEAN} or below, because
15191521 * JavaScript could use reflection to access an
15201522 * injected object's public fields. Use of this method in a WebView
0 commit comments