We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
To enhance frontend security, implement a strong Content Security Policy (CSP) using react-helmet-async in the React frontend.
react-helmet-async
This protects the app against XSS, clickjacking, and code injection attacks by restricting trusted sources.
'default-src': ["'self'"]
'unsafe-inline'
<meta http-equiv="Content-Security-Policy">
The text was updated successfully, but these errors were encountered:
piyushsinghgaur1
Successfully merging a pull request may close this issue.
Description:
To enhance frontend security, implement a strong Content Security Policy (CSP) using
react-helmet-async
in the React frontend.This protects the app against XSS, clickjacking, and code injection attacks by restricting trusted sources.
Tasks:
react-helmet-async
to manage document head and CSP headers'default-src': ["'self'"]
)'unsafe-inline'
unless absolutely required (and document it if used)<meta http-equiv="Content-Security-Policy">
from client appAcceptance Criteria:
react-helmet-async
is applied and CSP meta tags are set correctlyThe text was updated successfully, but these errors were encountered: