#ContentSecurityPolicy

2025-03-20

I have no patience for dealing with the #RubyOnRails core team, but if •you• do, then…

It would be super if it were possible to append values to the #ContentSecurityPolicy configuration. For example:

```ruby
Rails.application.configure do
config.content_security_policy do |policy|
policy.script_src :self, :https

if Rails.env.development?
policy.script_src << :unsafe_inline
end
end
end
```

Template initializer source: github.com/rails/rails/blob/ma

Pasquale 📷 🇫🇷 🦻pasqualeberesti@piaille.fr
2025-01-06

Des experts en #ContentSecurityPolicy ?

Pour mon site, j'ai :

<meta http-equiv="Content-Security-Policy" content="default-src https: data: 'unsafe-eval' 'unsafe-inline'; object-src 'none'">

Mozilla Observatory me dit :

Remove unsafe-inline and data: from script-src, overly broad sources from object-src and script-src, and ensure object-src and script-src are set.

Et si je mets :

Content-Security-Policy: default-src 'self';

ça casse mon site, mais je ne vois pas pourquoi. Quelqu'un saurait me dire ce qu'il me faut écrire, les ressources étant toutes sur mon site ?
Merci :)

2024-10-28

Apropos of nothing, can anyone recommend any services that aggregate CSP policy reports that are suitable for hobby websites? (i.e. are free, because I just want to do the right thing where I can, and don't care enough to pay for it because it's not vital to operations)

#WebDev #Webmaster #CSP #ContentSecurityPolicy

2024-10-06

#contentsecuritypolicy #csp an important additional line of defense for #webapplication to protect #security and #privacy of your user. You can add them to any web applications (even if you do not have the code!). More information: developer.mozilla.org/en-US/do

Content security policy for #wordpress: jornfranke.codeberg.page/techn

Content security policy for your own #springboot and #angular application: codeberg.org/ZuInnoTe/spring-b

Chaodditychaoddity
2024-08-15

Excellent. I figured out why Mastodon didn't work on Firefox. Apparently ANY tool that either changes the format of the webpage (disables javascript) including things that change the format (css) can cause catastrophe.

The solution for me was adding all mastodon-type pages to the black-list for 'bionic reader'.

2024-04-15

Setting up CSP headers closer to the client helps - setting up CSP headers as meta tags inside the index.html. This is protecting your website as early in the process as possible.

youtube.com/watch?v=iHEs4hUIR5

#contentsecuritypolicy #websitesecurity

Daniel Fisher(lennybacon)lennybacon@infosec.exchange
2024-04-01
KindSpells Labskindspells@mas.to
2024-02-10

Our first #OpenSource release since our company was legally constituted. Not a big deal, but sort of a milestone :D.

A package to improve the security of your Astro site against #XSS attacks:
npmjs.com/package/@kindspells/

#Astrobuild #WithAstro #ContentSecurityPolicy #SubresourceIntegrity #WebSecurity

Eric Harrer :typo3:ErHaWeb@phpc.social
2024-01-25

This is a great article to familiarize yourself with the Content Security Policy (#CSP) security concept. Many thanks to #b13 for sharing the well-founded information. #TYPO3 #CyberSecurity #ContentSecurityPolicy
b13.com/blog/introduction-to-c

2024-01-25

Implementing a halfway decent #contentsecuritypolicy is like herding cats.

The sheer number of random domains that third party services use is insane.

2024-01-06

It's 2024 and modern #javascript libraries still need you to allow unsafe-eval in your #contentsecuritypolicy :(

2023-10-12

@me So the missing css look like a #csp issue.

#ContentSecurityPolicy #MastoAdmin #selfhosted #arghhhhhhh

gemma lynn ⇒ ello@voidellotheth@bsd.network
2023-09-08

i'm annoyed that a good #contentSecurityPolicy doesn't let me just dump raw #javascript into #html anymore. that was really convenient.

#csp #webdev #frontend

Lukas Schieren :antifax:lukas@social.lukas-schieren.de
2023-09-02

Wie baue ich eine Content Security Policy (CSP) die nicht die ganze Webseite kaputt macht? :D

#ContentSecurityPolicy #CSP #ITSicherheit #Webseiten #Website #Followerpower

2023-04-13

Today I learned about Google's CSP evaluator.

Feed it a Content Security Policy or a link to a website where it can infer one, and it will evaluate it.

csp-evaluator.withgoogle.com/

#ContentSecurityPolicy #CSP

2023-03-05

Looking into the current state-of-the-art for #NodeJS security and I'm kind of baffled by how primitive it is compared to browsers.

* No #TrustedTypes.
* No `SafeHtml`.
* No #ContentSecurityPolicy.
* No permission abstractions.
* Not even a way to ban `eval()`.

Best thing I've found is `--frozen-intrinsics`, which is interesting, and I don't think there's a browser equivalent. You still have to freeze `globalThis` though to get much value out of it.

nodejs.org/en/docs/guides/secu

There are also some interesting security policies, which look like they have a lot of potential. However they're all experimental right now and seem focused on code integrity.

nodejs.org/api/permissions.htm

This this really the state-of-the-art for #Node security right now? Am I missing something?

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst