-
### Preliminary Checks
- [X] I have reviewed the documentation: https://clerk.com/docs
- [X] I have searched for existing issues: https://github.com/clerk/javascript/issues
- [X] I have not a…
-
Traceback (most recent call last):
, line 417, in
initialTest(val.url,val.headers)
, line 372, in initialTest
out = check_csp_vulnerabilities(response.headers['Content-Security-Policy…
-
-
**Brief description**
One of the upcoming CSP headers is `Cross-Origin-Opener-Policy`
It's not currently enabled on the JS Helper to allow it to be included.
This is only an issue if the Develo…
-
:information_source: View this commit [on Github](https://github.com/TYPO3/typo3/commit/13758d53870c9409f7e36ba5f6b6d01671b2b658)
:busts_in_silhouette: Authored by Oliver Hader oliver@typo3.org
:heavy…
-
After updating to version ThingWorx 9.3.17-b2768 PTC enforces usage of their ContentSecurityPolicy found within PlatformSubsystem.
It seems like the default settings makes it impossible for MonacoEdi…
-
I am experiencing an issue with loading the ANDI CSS file (https://www.ssa.gov/accessibility/andi/andi.css) on our Salesforce Community pages. It appears to be blocked due to Content Security Policy (…
-
something like this should be in nextjs
connect-src 'self' https://chat.stream-io-api.com wss://chat.stream-io-api.com ${process.env.NEXT_PUBLIC_API_URL || ''};
-
Pursuant to external security review, document steps required and/or recommendations for Content Security Policy in a system that uses Spartacus as storefront.
-
https://github.com/google/eleventy-high-performance-blog/blob/main/_11ty/apply-csp.js#L71
`const headersPath = "./_site/_headers";`
This forces **Netlify** use. I'd rather use a modified DOM or SED …