WICG / csp-nextLinks
A Modest Content Security Proposal
☆41Updated 4 years ago
Alternatives and similar repositories for csp-next
Users that are interested in csp-next are comparing it to the libraries listed below
Sorting:
- This is both a terrible and wonderful idea.☆12Updated 6 years ago
- WebAppSec Content Security Policy☆221Updated 2 months ago
- Secure Contexts, but with _more_ secureness!☆20Updated last year
- Custom ESLint rule to disallows unsafe innerHTML, outerHTML, insertAdjacentHTML and alike☆239Updated 4 months ago
- Fetch Metadata☆75Updated 10 months ago
- Discussion area for security aspects of ECMAScript☆64Updated 8 years ago
- Cookies should take scheme into account, just like every other storage mechanism on the web.☆16Updated 5 years ago
- ☆11Updated 3 years ago
- A browser API to prevent DOM-Based Cross Site Scripting in modern web applications.☆647Updated 2 months ago
- What if developers could opt-into better default behaviors en masse, forcing them to pick and choose the legacy risks they want to enable…☆19Updated 3 years ago
- ☆261Updated 2 months ago
- Opaque Response Blocking (CORB++)☆36Updated 3 years ago
- Incrementally better HTTP state management.☆300Updated 3 years ago
- Network Error Logging☆90Updated this week
- Post-Spectre Web Development☆18Updated 2 years ago
- ☆23Updated 3 years ago
- TC39 proposal for mitigating prototype pollution☆52Updated 2 years ago
- `document.domain` intentionally weakens the only security boundary we have. Perhaps we can dump it?☆17Updated 2 years ago
- ☆76Updated last year
- [On hold for now] A mechanism for origins to set their origin-wide configuration in a central location☆33Updated 3 years ago
- Parse Content Security Policy headers, warn about policy errors, safely manipulate, render, and optimise policies☆72Updated 2 months ago
- Security contract types☆60Updated 3 years ago
- Signature-based Resource Loading Restrictions☆44Updated 5 months ago
- Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link …☆165Updated 2 months ago
- Log all the CSP violations!☆57Updated 2 years ago
- Test Page for HTTP/2 prioritization (server and browser)☆109Updated 6 years ago
- Web Application Security Working Group repo☆653Updated 2 months ago
- ☆33Updated 3 years ago
- Named vulnerabilities and their practical impact☆436Updated 4 years ago
- ☆144Updated 3 weeks ago