Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Set CSP headers to true by default #14356

Merged
merged 1 commit into from
Mar 1, 2024

Conversation

snipe
Copy link
Owner

@snipe snipe commented Mar 1, 2024

We had been defaulting this to false because it was causing issues with vue, but we don't use vue anymore. While we mitigate the need for a CSP elsewhere in the application code, this should make it more compliant with common security scans.

@snipe snipe merged commit bc5c559 into develop Mar 1, 2024
3 of 6 checks passed
@snipe snipe deleted the fixes/set_csp_rule_to_true_by_default branch March 1, 2024 11:37
Copy link

what-the-diff bot commented Mar 1, 2024

PR Summary

  • Enabling Content Security Policy
    The configuration change made in this PR enables Content Security Policy (CSP) in the application. Having CSP turned on provides an additional layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. This ensures users interact with our application in the safest possible environment.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant