You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In the Usage of "'strict-dynamic'" section (https://w3c.github.io/webappsec-csp/#strict-dynamic-usage) we should describe the relaxation of the policy if the attacker controls the URL of a script loaded dynamically via a non-parser-inserted API.
Maybe something like this (rough draft):
"""
Note: With 'strict-dynamic', scripts created at runtime via APIs such as createElement() will be allowed to execute by the policy. If the location of a dynamically created script is controlled by an attacker, the policy will permit the loading of arbitrary external scripts. Developers using applications or frameworks which tend to determine script locations at runtime should audit the uses of non-parser-inserted APIs to add scripts, and make sure they are not invoked with untrusted data.
"""