You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Sandbox security tests complain about unsafe usage in Content Security Policy(CSP)
Content Security Policy (CSP) implemented, but allows 'unsafe-eval' and allows forms to be submitted to any source.
'unsafe-eval' - 'unsafe-eval' allows the execution of code injected into DOM APIs such as eval().
This policy allows inline styles ('unsafe-inline'). Although they are not as bad as inline scripts in terms of security, an injection bug in script area would allow the attacker to modify page appearance.
✔️ : it seems that with vue3 if Single-File Components (SFC) are pre-compiled (default when project is build) there is no usage of eval() and no need to add 'unsafe-eval' in CSP.
Sandbox security tests complain about unsafe usage in Content Security Policy(CSP)
See :
We need to investigate about that.
The text was updated successfully, but these errors were encountered: