Replies: 1 comment 1 reply
-
Hi @Ray0907 Unfortunately this is a known limitation of CSP for all JS frameworks, it is totally unrelated to Nuxt Security. You have two options:
We filed an RFC proposal on the CSP spec, you can support it here : w3c/webappsec-csp#625 For more reading on the subject: Moving to discussion as good reference for others. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Environment
Nuxt Security Version
v2.2.0
Default setup used?
Yes, the bug happens even if the security option is not customized
Security options
Reproduction
as description
Description
Using the default
unsafe-inline
in style-src fails OWASP security scans with medium/high risk warnings.When configuring a stricter CSP by replacing
unsafe-inline
with nonces:This results in runtime CSP violations like
Additional context
No response
Logs
Beta Was this translation helpful? Give feedback.
All reactions