@@ -116,17 +116,16 @@ var paymentOptions = new MessageSecurityOptions()
116116}
117117```
118118
119- ## Security Features
119+ ## Security
120120
121- ### Sandbox Security Levels
121+ ### Content Security Policy
122122
123- | Level | Description | Use Case |
124- | -------| -------------| ----------|
125- | ** None** | No restrictions | Trusted content only |
126- | ** Basic** | Scripts + same-origin | Most trusted widgets |
127- | ** Permissive** | + forms + popups | Interactive widgets |
128- | ** Strict** | Scripts + same-origin only | Display widgets |
129- | ** Paranoid** | Scripts only | Untrusted content |
123+ Comprehensive CSP integration for defense-in-depth security:
124+ - ** Automatic header generation** - CSP headers built from iframe requirements
125+ - ** Environment-aware policies** - Different rules for development vs production
126+ - ** Fluent configuration API** - Easy-to-use builder pattern for CSP rules
127+ - ** Violation monitoring** - Real-time CSP violation reporting and analysis
128+ - ** Nonce and hash support** - Modern CSP techniques for script security
130129
131130### Message Validation
132131
@@ -136,6 +135,16 @@ All iframe messages are automatically validated for:
136135- ** Security filtering** - Blocks malicious patterns and script injection
137136- ** Custom validation** - Extensible validation pipeline
138137
138+ ### Sandbox Security Levels
139+
140+ | Level | Description | Use Case |
141+ | -------| -------------| ----------|
142+ | ** None** | No restrictions | Trusted content only |
143+ | ** Basic** | Scripts + same-origin | Most trusted widgets |
144+ | ** Permissive** | + forms + popups | Interactive widgets |
145+ | ** Strict** | Scripts + same-origin only | Display widgets |
146+ | ** Paranoid** | Scripts only | Untrusted content |
147+
139148## Demo
140149
141150[ ![ BlazorFrame Demo] ( https://github.com/user-attachments/assets/106e02f8-5b7a-4a02-9748-b5fc1f540168 )] ( https://github.com/Tim-Maes/BlazorFrameDemo )
0 commit comments