[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

Name
Options
Comment
Verification
4chan Pass users can bypass this verification. [Learn More] [Login]
File
  • Please read the Rules and FAQ before posting.
  • You may highlight syntax and preserve whitespace by using [code] tags.

08/21/20New boards added: /vrpg/, /vmg/, /vst/ and /vm/
05/04/17New trial board added: /bant/ - International/Random
10/04/16New board for 4chan Pass users: /vip/ - Very Important Posts
[Hide] [Show All]


[Advertise on 4chan]


File: IMG_2505.jpg (248 KB, 750x739)
248 KB
248 KB JPG
Should I be concerned or is this just noise?
>>
The one that I can immediately help you with is Cross-Domain Javascript Source Inclusion. That one is a node in an attack vector that only works if you have some code that is vulnerable to injection like XSS or CRLF injection.

Is not a vulnerability per-se, think about playing a card game and you make combos with cards during your turn. By itself, Cross-Domain Javascrip Source is not dangerous but if you don't validate user input a threat actor can use it to perform an attack.
>>
For CSP read it about it here.

https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html
>>
File: 1743736293913487.jpg (386 KB, 896x960)
386 KB
386 KB JPG
You just got ZAPPED by the OWASP
>>
>>107896780
Don't be too concerned, but if you have a few minutes, these are pretty easy fixes, just add a few headers:
>Content-Security-Policy: frame-ancestors 'none';
>X-Frame-Options: DENY
>Strict-Transport-Security: max-age=63072000; includeSubDomains; preload

Also, try serving any JS libraries from your own domain, not a CDN. If this is not possible, add
>crossorigin="anonymous" integrity="<HASH>"
to your <script> elements, you can get the hash from here: https://srihash.org/
>>
Fixed the headers (CSP, X-Frame-Options, HSTS) without issues.
Tried to add SRI for https://cdn.tailwindcss.com, but hashing fails because the CDN doesn’t allow CORS / script is dynamic.
Everything else is fixed, this is the only thing I couldn’t properly solve unless I self-host Tailwind.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.