Title here
Summary here
Content Security Policy (CSP) reduces XSS risk by restricting where scripts, styles, fonts, and other resources can load from.
Use self by default and add only domains your site actually needs.
[[headers]]
for = "/*"
[headers.values]
Content-Security-Policy = "default-src 'self'; manifest-src 'self'; connect-src 'self'; font-src 'self'; img-src 'self' data:; script-src 'self'; style-src 'self'; frame-ancestors 'none'; base-uri 'self'; object-src 'none'"If inline scripts are required, prefer nonces or hashes instead of unsafe-inline.
Deploy a Content-Security-Policy-Report-Only header, review violations, then enforce once clean.
Thulite/Core generates fingerprinted assets and SRI attributes, which work well with a strict CSP. When integrations change, re-check CSP so new endpoints and assets are explicitly allowed.
In browser dev tools, confirm: