-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement Content Security Policy #2873
Comments
I think we should target this for CSP (on newlines for readability):
I think the only inline script we use right now is the bootstrapping code in the initial payload, but #15904 should remove that need. Unfortunately, I think we'll |
I think we should keep A blanket block of eval is a course method to ensure security. Rather, I would like us to evaluate the impact of script-injection attacks on a library-2-library basis, instead of enforcing it by a CSP, particularly as it pertains to unsafe-eval. |
Ideally the CSP lockdown should be as tight as possible. One alternative (in case a tight lockdown is impossible) is to use the newer More details: |
I did a sample code with a very restrictive CSP rule set for the main window, and a much more relaxed (anything goes) rules for the iframe content in this test: https://github.com/nyurik/csp-vega-test . Note that the |
Our initial CSP implementation was merged in #29545, so I'm going to close this, and we can track any future changes to this policy as discrete issues. |
Just FYI -- Vega 5.13.0 adds a slower CSP-compliant interpreter version in case we ever get to the point of a full CSP lock down. |
Kibana is an excellent tool for log data (via Logstash). Log data is raw (it should be), but this also increases the vulnerability to XSS. Perhaps it would be a good idea to harden Kibana with CSP.
https://developer.mozilla.org/en-US/docs/Web/Security/CSP
http://www.html5rocks.com/en/tutorials/security/content-security-policy/
The text was updated successfully, but these errors were encountered: