-
Notifications
You must be signed in to change notification settings - Fork 810
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Going forward with CSP #108
Comments
Agreed. Using |
Interesting, there is a new |
And there is more crazy (experimental) stuff (again found via Googles CSP tool), but that seems to look like a better solution for |
The Lines 34 to 35 in 8232dce
|
Regarding
|
Also the docs for this say:
So would likely not be a bad idea to use this altogether… |
Opened a new issue for that, so we can keep this “meta-issue” here and fix that WebAssembly loading: #814 |
Google has just released a CSP testing tool and some more detailed information about CSP.
They mention some interesting things:
unsafe-inline
can always be used as a fallback for older browsers supporting only CSPv2. CSPv3-compliant browsers will ignore this ifstrict-dynamic
, nonces or hashes are used.'self'
inscript-src
as it can be bypassed in certain cases.In CSPv3 you can AFAIK also define subdirectories (
privatebin.org/scripts
), which could be another way to strengthen our policy. However in this case there might be compatibility issues.So together with #82 this might be an issue we can address in the future when CSP has further developed itself 😃
The text was updated successfully, but these errors were encountered: