CARVIEW |
Select Language
HTTP/2 200
date: Sat, 09 Aug 2025 09:46:40 GMT
content-type: text/html; charset=utf-8
cache-control: max-age=0, private, must-revalidate
content-security-policy: default-src 'none'; base-uri 'self'; child-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com wss://alive-staging.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com release-assets.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com copilotprodattachments.blob.core.windows.net/github-production-copilot-attachments/ github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/
link: ; rel=preload; as=fetch; crossorigin=use-credentials
referrer-policy: no-referrer-when-downgrade
server-timing: issue_layout-fragment;desc="issue_layout fragment";dur=185.6011,issue_conversation_content-fragment;desc="issue_conversation_content fragment";dur=491.349313,issue_conversation_sidebar-fragment;desc="issue_conversation_sidebar fragment";dur=47.073677,nginx;desc="NGINX";dur=1.258888,glb;desc="GLB";dur=99.422996
strict-transport-security: max-age=31536000; includeSubdomains; preload
vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, X-Requested-With, Accept,Accept-Encoding, Accept, X-Requested-With
x-content-type-options: nosniff
x-frame-options: deny
x-voltron-version: 321f992
x-xss-protection: 0
server: github.com
content-encoding: gzip
accept-ranges: bytes
set-cookie: _gh_sess=qZ%2Bts3v8eUUAZDGOxEmXZAvneyeHOQyCaEJ0DLnbogKww9CQ6yQ3sIxd8jvpAp2w7N6EcYVUXXx4CfCGEcDqI%2Bz%2Fm9fE%2FoN3rwOb7PMMKd13SMrOxWNjOEmvSjN6ZsIwdCHkbWG3s1CA9KEm0tAtDvwFDliaBsyGdRyiIw8vhWCCZvY3f%2FP5srHPbIoBdF38ZBGRiBoaj9lg%2BzBTwwCLRXwrckkED5%2BbXmXRZqQeMFwZ6KoihZWrRMVdJEwrd0DYhm6KqXMv5WR%2BV%2FV44bCZQw%3D%3D--SxES25EDYv4iFl2t--5PzE8yPzcj4Mcf2jdBXaIA%3D%3D; Path=/; HttpOnly; Secure; SameSite=Lax
set-cookie: _octo=GH1.1.1434829241.1754732799; Path=/; Domain=github.com; Expires=Sun, 09 Aug 2026 09:46:39 GMT; Secure; SameSite=Lax
set-cookie: logged_in=no; Path=/; Domain=github.com; Expires=Sun, 09 Aug 2026 09:46:39 GMT; HttpOnly; Secure; SameSite=Lax
x-github-request-id: 9438:236F62:A7BE1:D74B9:689718FF
Does `strict-dynamic` allow dynamically adding inline scripts? · Issue #426 · w3c/webappsec-csp · GitHub
No labelsNo typeNo projectsNo milestoneNone yetNo branches or pull requests
Skip to content
Navigation Menu
{{ message }}
-
Notifications
You must be signed in to change notification settings - Fork 83
Open
Description
For example, if I have
<script nonce="asdf">
x = document.createElement('script');
x.textContent = 'console.log(0)';
document.head.appendChild(x);
</script>
on a page with a CSP of script-src 'strict-dynamic' 'nonce-asdf'
, does it log 0
or not?
As best I can tell, the CSP spec says no. In particular,
- The inserted script lacks a
src
attribute, so step 15 of HTML's prepare a script governs, which calls - Should element’s inline type behavior be blocked by Content Security Policy? with type "script", which in step 3.1.1 calls
- the inline check for
script-src
, which in step 4 calls - Does element match source list for type and source?, which
- fails to permit the script via allowing all inline behavior for type "script"
- fails to permit the script via a
nonce-source
expression, becauseelement
does not have anonce
attribute, - fails to permit the script via a
hash-source
expression, because there are none, and therefore - fails to permit the script at all.
(Does element match source list for type and source? makes no mention of strict-dynamic
except to turn off unsafe-inline
.)
But Firefox and Chrome both allow it. (Safari does not support strict-dynamic
at all.)
The section on the usage of strict-dynamic
is not helpful; it says that "Script requests which are triggered by non-"parser-inserted" script elements are allowed", which implies it only applies to external scripts, but also says "scripts created at runtime will be allowed to execute", which implies it would apply to inline ones as well.
Metadata
Metadata
Assignees
Labels
No labels
Type
Projects
Milestone
Relationships
Development
Issue actions
You can’t perform that action at this time.