-
Notifications
You must be signed in to change notification settings - Fork 153
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
todo: improve security of HTTP headers #591
Comments
I'd like to tackle this issue, can I get it assigned? Thanks! |
The report was at The problemContent Security Policy (CSP from now on) is a security feature used in web applications to mitigate certain types of attacks, such as cross-site scripting (XSS) and data injection. Mozilla's Observatory requires the values Possible solutions
ThoughtsFor the moment, an Here's the Observatory report for my PR (#592): https://observatory.mozilla.org/analyze/saaskit-staging.deno.dev |
@Jabolol The CSP issue will be fixed in Fresh itself. Already did so for inline scripts (see denoland/fresh#1772), and inline styles are next on my agenda. |
Work in progress. See #591 for the relevant discussion. --------- Co-authored-by: Asher Gomez <ashersaupingomez@gmail.com>
For the moment I'm a little bit reticent because the only way to implement the export const config: RouteConfig = {
csp: true,
}; Per se, there is no way to add this in a plugin as of yet. How should we go forward? |
I don't understand. Can you elaborate? |
So since we are using Nonetheless, this is not feasible as of yet. To enable |
Oh, yeah, I always thought CSP functionality would come from the plugin we previously created anyway 👍🏾 |
Oh, my misunderstanding... Looking through Fresh's documentation and codebase, it seems that adding the route config to each route is the only current means of enabling CSP. Perhaps we should add the ability to allow CSP at the middleware level to Fresh itself. Either way, thinking about it further, the current security headers are sufficient for our use case, and CSP may be overkill. I'd be open to it in the future, but for now, it's good enough. Thanks for your help, @Jabolol! |
HTTP headers have much room for improvement, in terms of security. This should be fixed by a plugin with reasonable settings. Report: https://observatory.mozilla.org/analyze/hunt.deno.land
The text was updated successfully, but these errors were encountered: