Link to this headingContent Security Policy (CSP)
strong mitigation against cross-site scripting attacks
https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
https://cspvalidator.org/#url=https://cspvalidator.org/
https://csp-evaluator.withgoogle.com/
Link to this headingNonce
This can remove the unsafe-inline part of the CSP value
Restricts usage of script tags without the nonce value
Restricts usage of style tags without the nonce value
Nonce for external scripts
Link to this headingKeys
script-src:
style-src:
default-src:
img-src:
child-src:
foobar-src:
report-uri:
Link to this headingscript-src
https://developer.mozilla.org/en-US/docs/Web/HTML/Global_attributes/nonce
Nonce Value: Only script tags with the nonce value will run
Content-Security-Policy: script-src ‘nonce-8IBTHwOdqNKAWeKl7plt8g==’
Link to this headingSpecial Values
‘unsafe-inline’: allows the execution of unsafe in-page scripts and event handlers.
Link to this headingExfil Bypasses
https://web.archive.org/web/20240519115002/https://btidor.dev/content-security-policy
WebRTC Bypass:
Link to this headingWindow Bypass
If there is data you want to extract from a website you can still just use the js below