Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Google CSP Evaluator Recommendations #62

Open
hkamran80 opened this issue Oct 31, 2023 · 0 comments
Open

Google CSP Evaluator Recommendations #62

hkamran80 opened this issue Oct 31, 2023 · 0 comments
Labels
enhancement New feature or request

Comments

@hkamran80
Copy link
Owner

  • default-src: data: URI allows the execution of unsafe scripts
  • script-src: Host whitelists can frequently be bypassed. Consider using 'strict-dynamic' in combination with CSP nonces or hashes
    • 'self' can be problematic if you host JSONP, Angular or user uploaded files.
  • object-src (missing): Can you restrict object-src to 'none'?
  • require-trusted-types-for (missing): Consider requiring Trusted Types for scripts to lock down DOM XSS injection sinks. You can do this by adding require-trusted-types-for 'script' to your policy.

Scan Results

@hkamran80 hkamran80 added the enhancement New feature or request label Oct 31, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant