-
Notifications
You must be signed in to change notification settings - Fork 119
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
<link>-based API should be subject to CSP #581
Comments
It surprises me that we'd directly execute script via |
I don't think it is directly. Web bundles |
I think we have similar restrictions for |
isn't supposed to directly execute scripts or anything, right. So when <script ...> executes a script from it should respect to script-src CSP. |
Thanks, @kinu! I have a few questions:
|
Today the former, but in #651 I'm proposing switching to the latter |
Since
<link rel="webbundle" ..>
can be used to load or redirect loads of scripts it should be subject to CSPsscript-src
directive.Especially the CSP nonce attribute should be verified in case a CSP restricts script loading based on nonces.
I.e. in the presence of a
Content-Security-Policy script-src 'nonce-random123'
header only<link rel="webbundle" nonce="random123" ..>
should be allowed to execute.Same holds true for
<script type=”module” ..>
or similar declarative script loading mechanisms./ cc @mikewest @arturjanc @koto
The text was updated successfully, but these errors were encountered: