-
Beta Was this translation helpful? Give feedback.
Replies: 6 comments 7 replies
-
Hi, Thank you very much for your very interesting question 😃 For your context (self hosted static JS script), I propose to set the following HTTP response header:
@riramar What do you think about my proposal? @owem777 I hope this can help you, feel free to indicate to us if it is not the case and then we will deep dive into your context 😃 |
Beta Was this translation helpful? Give feedback.
-
That's an interesting question and I think you @righettod are right. |
Beta Was this translation helpful? Give feedback.
-
There have been numerous attacks that relied on abusing non-HTML resources as HTML. It's strongly recommended to set headers like X-Content-Type-Options and Content-Type on those resources. Essentially, the requests to all same-origin/same-site resources are cookied and authenticated. Best to set all headers. |
Beta Was this translation helpful? Give feedback.
-
Without a context it's difficult to determine which headers and values. |
Beta Was this translation helpful? Give feedback.
-
@riramar Can you remove the ✔ emoji in the title? |
Beta Was this translation helpful? Give feedback.
-
Done. |
Beta Was this translation helpful? Give feedback.
Hi,
Thank you very much for your very interesting question 😃
For your context (self hosted static JS script), I propose to set the following HTTP response header:
Strict-Transport-Security
: To ensure that the script is delivered using a secure channel (HTTPS).X-Content-Type-Options
: To prevent MIME type abuse for IE/Chrome context.Cross-Origin-Embedder-Policy
+Cross-Origin-Opener-Policy
+Cross-Origin-Resource-Policy
: To prevent a remote site to load your script and also isolate the browsing context at browser level.@riramar What do you think about my proposal?
@owem777 I hope this can help you, feel free to indicate to us if it is not the case and then we will deep dive into your c…