Skip to content

Commit 806845d

Browse files
authored
Merge pull request #262 from JaredCE/beta-rebase
Beta rebase
2 parents 6bdd84f + 04c1ec4 commit 806845d

File tree

5 files changed

+1622
-22
lines changed

5 files changed

+1622
-22
lines changed

README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -932,7 +932,7 @@ The generator will interpret your settings for CORS and automatically add the re
932932

933933
You can make use of the [OWASP Secure Headers](https://owasp.org/www-project-secure-headers/#x-permitted-cross-domain-policies) to generate response headers. These are a selection of response headers with default values that OWASP recommends returning with your response to help secure your application.
934934

935-
The OWASP Secure Headers Project contains a set of recommended headers to return with recommended values, when generating the documentation, the generator will attempt to get the latest version of this document and apply the latest recommendations. If you do not allow outside connections, it will default to a version of recommendations from **2024-09-19 21:29:28 UTC**.
935+
The OWASP Secure Headers Project contains a set of recommended headers to return with recommended values, when generating the documentation, the generator will attempt to get the latest version of this document and apply the latest recommendations. If you do not allow outside connections, it will default to a version of recommendations from **2025-08-17 15:23:47 UTC**.
936936

937937
Like CORS, if you have already set any of the OWASP Secure headers via `responseHeaders`, it will not overwrite them.
938938

@@ -982,6 +982,7 @@ The full list of OWASP Secure Headers you can set are:
982982
- xContentTypeOptions - X-Content-Type-Options,
983983
- xFrameOptions - X-Frame-Options,
984984
- xPermittedCrossDomainPolicies - X-Permitted-Cross-Domain-Policies
985+
- xDNSPrefetchControl - X-DNS-Prefetch-Control
985986

986987
You should note that `Pragma` has been [deprecated by owasp](https://owasp.org/www-project-secure-headers/#pragma), this plugin will issue a warning when you are still using Pragma and might drop support.
987988

json/owasp.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"last_update_utc": "2024-09-19 21:29:28",
2+
"last_update_utc": "2025-08-17 15:23:47",
33
"headers": [
44
{
55
"name": "Cache-Control",
@@ -11,7 +11,7 @@
1111
},
1212
{
1313
"name": "Content-Security-Policy",
14-
"value": "default-src 'self'; form-action 'self'; object-src 'none'; frame-ancestors 'none'; upgrade-insecure-requests; block-all-mixed-content"
14+
"value": "default-src 'self'; form-action 'self'; base-uri 'self'; object-src 'none'; frame-ancestors 'none'; upgrade-insecure-requests"
1515
},
1616
{
1717
"name": "Cross-Origin-Embedder-Policy",
@@ -41,6 +41,10 @@
4141
"name": "X-Content-Type-Options",
4242
"value": "nosniff"
4343
},
44+
{
45+
"name": "X-DNS-Prefetch-Control",
46+
"value": "off"
47+
},
4448
{
4549
"name": "X-Frame-Options",
4650
"value": "deny"

0 commit comments

Comments
 (0)