Livesecurityshipped v1.0.0
Content Security Policy Builder
Build Content-Security-Policy headers visually without memorizing directive syntax. Toggle sources for each directive (script-src, style-src, img-src, etc.), add domains, and see the generated header in real-time. Includes explanations for each directive and common presets for popular frameworks.
cspsecurityheaderspolicyxss
presets:
Directives
default-srcFallback for all fetch directivesscript-srcJavaScript sourcesstyle-srcCSS sourcesimg-srcImage sourcesfont-srcFont sourcesconnect-srcfetch, XHR, WebSocket, EventSourceframe-srcFrame/iframe sourcesmedia-srcAudio/video sourcesobject-srcPlugin sources (Flash, etc.)base-uriRestricts <base> URLsform-actionForm submission URLsframe-ancestorsWho can embed this pagereport-uriViolation reporting endpointHeader (enforce)
Content-Security-Policy: default-src 'none'; script-src 'self'; style-src 'self'; img-src 'self' data:; connect-src 'self'; font-src 'self'; base-uri 'self'; form-action 'self'; frame-ancestors 'none'Header (report-only)
Content-Security-Policy-Report-Only: default-src 'none'; script-src 'self'; style-src 'self'; img-src 'self' data:; connect-src 'self'; font-src 'self'; base-uri 'self'; form-action 'self'; frame-ancestors 'none'Meta tag
<meta http-equiv="Content-Security-Policy" content="default-src 'none'; script-src 'self'; style-src 'self'; img-src 'self' data:; connect-src 'self'; font-src 'self'; base-uri 'self'; form-action 'self'; frame-ancestors 'none'">Security analysis
ℹPolicy looks reasonable. Test in report-only mode first.
🔒 Always test new policies with Content-Security-Policy-Report-Only first.