Consider dropping unsafe-inline & data: from script-src CSP. #26

Open
opened 2023-10-26 12:56:06 -05:00 by DarkFeather · 0 comments
Owner

Per https://observatory.mozilla.org/analyze/aninix.net:

Content Security Policy (CSP) implemented unsafely.

This includes 'unsafe-inline' or data: inside script-src, overly broad sources such as https: inside object-src or script-src, or not restricting the sources for object-src or script-src.

We should consider testing for what resources need this and otherwise update in https://aninix.net/AniNIX/Ubiqtorate/src/branch/main/roles/WebServer/files/conf/default.csp.conf#L1.

Per https://observatory.mozilla.org/analyze/aninix.net: ``` Content Security Policy (CSP) implemented unsafely. This includes 'unsafe-inline' or data: inside script-src, overly broad sources such as https: inside object-src or script-src, or not restricting the sources for object-src or script-src. ``` We should consider testing for what resources need this and otherwise update in https://aninix.net/AniNIX/Ubiqtorate/src/branch/main/roles/WebServer/files/conf/default.csp.conf#L1.
DarkFeather added the
RFC
label 2023-10-26 12:56:13 -05:00
DarkFeather self-assigned this 2023-10-26 12:56:17 -05:00
Sign in to join this conversation.
No description provided.