-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Web security improvements #146
Conversation
It's okay to use href="#" because the JS event handler calls event.preventDefault()
This is running into brianblakely/nodep-date-input-polyfill#4 and harvesthq/chosen#2423 on the reports pgae for now. |
I added unsafe-inline to the style-src rules, this is a pretty good compromise for now. I'll keep an eye on the above-mentioned issues. We can tighten the style-src policy later after fixing or replacing the libraries in question. |
FYI Pushed a couple more things and redeployed to https://staging.oversight.garden/ |
This is super solid. |
Also cc-ing @marumari for her enjoyment. |
Awesome! Looks great and fantastic work. Glad you've found the Observatory to be helpful! |
Motivated by Mozilla's HTTP observatory, here are some security improvements for the site. This boosts the grade from a C- to an A+ so far.
This still needs a little more testing, and I have a phantom CSP error to track down. In Firefox, but not Chromium, I get the following message.
The Chosen library seems to be generating CSP errors too; I'll see if those are fixed upstream.