Content Security Policy, grounded in your site
CSP Report crawls your URLs, summarizes origins by directive, and helps you draft policies you can validate in Report-Only before you enforce.
What implementing a Content Security Policy delivers
CSP may be implemented as a report-only header or as an enforced policy. The same directives apply; the difference is whether the browser blocks incompatible loads.
The browser evaluates the policy and issues violation reports without blocking resource loads. Use this mode to assess impact and refine directives before enforcement.
The browser applies the policy and blocks disallowed loads. Violations may still be reported when report-to or report-uri is configured. Adopt this header once Report-Only results are stable.
Practical tooling for teams that want stronger defaults without freezing the whole release train.
Walk your site with browser rendering so script, style, image, font, and frame sources reflect what visitors actually load—not guesswork from static files.
Turn discovered origins into a structured starting policy you can paste into Report-Only, tune, and iterate before you enforce.
Keep reports private to your workspace, or generate a public link so security and engineering can review the same findings.
Re-run crawls as your stack changes. Compare guidance as third parties and inline usage evolve.
Content Security Policy is more than a single HTTP header. It is how you tell the browser which sources are allowed for scripts, styles, frames, and more—so exploits and unexpected third parties surface as violations instead of silent compromises. The formal rules live in the W3C Content Security Policy Level 3 specification.
A tight Content Security Policy limits where scripts, styles, and other subresources may load from—your first line of defense when XSS or supply-chain abuse appears.
Report-Only mode and browser reports show what would have been blocked. You fix allowlists deliberately instead of learning in production.
Many security programs and audits expect explicit control over executable content. A clear policy documents that posture in the browser itself.