-
Notifications
You must be signed in to change notification settings - Fork 61
Description
Hi Team,
We are using open-f2 to build micro front-end apps for our customers. Recently we had Penetration testing for the security of the app and the security team found that we are using 'unsafe-inline' CSP which is unsafe for the security of the security purpose. If we remove 'unsafe-inline' then open-f2 logging error on the console.
According to the security Team,
• script-src 'unsafe-inline' - Inline JavaScript code, commonly used in XSS attacks, is
allowed.
• script-src 'unsafe-eval' - Potentially dangerous JavaScript functions, such as eval(),
Function(), and setTimeout() are allowed.
Remediation they have provided
• we recommend redefining a more secure content security policy for the
application as part of a defense-in-depth strategy.
• Where possible, depreciate and remove all inline JavaScript code and use of 'data:' URIs.
• Update the application's 'Content-Security-Policy' directives to reflect this change by
removing these values.
• Establish a restrictive 'default-src' using "Content-Security-Policy: default-src 'self'" and then
open it up only where needed using the content-specific directives (e.g. script-src, objectsrc).
See the below error in the console

Please update library 1.4.5 by removing or updating unsafe inlines.
Libraray Version : 1.4.5
React Version : 16