Ajouter des headers HTTP de securite et preparer une CSP stricte #10
Labels
No labels
area: auth
area: deps
area: frontend
area: gameplay
area: import
area: infra
area: product
area: tests
priority: P0
priority: P1
priority: P2
priority: P3
type: bug
type: chore
type: feature
type: infrastructure
type: performance
type: security
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: thibaud-lclr/ltbxd-actorle#10
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
1. Le souci
Le runtime ne renvoie pas aujourd'hui les headers de durcissement les plus attendus (
Content-Security-Policy,X-Frame-Options,Referrer-Policy,Strict-Transport-Security). En plus, des scripts inline rendent une CSP stricte plus difficile.2. Proposition de solution
Mettre une base de durcissement navigateur et sortir progressivement les scripts inline afin de pouvoir appliquer une CSP utile en production.
3. Proposition d'implementation