-
Hi, thank you for this amazing library. It's been really nice to work with it. Recently after migrating the entire app to use the `standardized-audio-context` library, I'm facing a production-only pro…
-
- Site: [https://magik3a.github.io](https://magik3a.github.io)
**New Alerts**
- **CORS Misconfiguration** [40040] total: 2:
- [https://magik3a.github.io/dev.bg](https://magik3a.github.io/dev…
-
¡Hola chicos!
Hace unos días se publicó una nota en el portal donde yo inserté en dicho texto este hiper-vinculo: https://developer.mozilla.org/es/docs/Web/Security/CSP
No sé si podríamos traducir los…
-
Content Security Policies need to be set to 'unsafe-inline' to work with xterm.js. Older versions didn't use inline styles so this wasn't an issue.
Ideally xterm should stop using inline styles or …
-
This package works great, but I needed to add a [CSP](https://content-security-policy.com/) to my webpage that runs the editor, and in the CSP I need to list the resources the editor loads as exceptio…
-
- Site: [https://youngowl13.github.io](https://youngowl13.github.io)
**New Alerts**
- **CORS Misconfiguration** [40040] total: 2:
- [https://youngowl13.github.io/zap](https://youngowl13.gith…
-
[This issue is imported from pivotal](https://www.pivotaltracker.com/story/show/171227292)
The evaluation of the Content Security Policy (CSP) revealed that it includes overly weak rules. The CSP…
-
Not sure if this will complicate things too much, but I want a stricter set of rules for my app's pages on / to rules for the /admin pages which in this case is Wagtail. Wagtail requires unsafe-inline…
-
Hi Nelmio Team,
I wanted to open a discussion with respect to extending the current CSP module to include support for `trusted-types` and `require-trusted-types-for` headers. Although both Symfony …
-
When we come to tighten up the CSP, here are [all the potential rules](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy) it can have (see below). Note that some of the…