Hi Yuri,

Is this required by CSP?
I do not see how it improves security?
Well the script-src 'self' prevents the browser to execute JS that comes from any external server. If an attacker wants your browser to execute his JS, it has to compromise your servers first. For me, yes it improves security.

Meanwhile, littering all forms with IDs and adding back all events in
the js is crappier in my mind (there's now 50+ extra lines of code that
do nothing but that).
You mean 50 lines more if you use my patch ? It may be, but all the JS is "hidden" in an external .js and the HTML code should look more readable, even if (in our case) the changes are small. But it is a question of point of view I imagine. I always try to make clean HTML and put the style in CSS and the intelligence in JS. I personally think it is a good practice.

I think jquery could be substituted with zepto easily, but I do not know
if it improves on this matter.

I did not know zepto, I'll check if the eval() function is used. This is the main issue of jQuery that imposes the 'unsafe-eval' statement in the CSP.

Well, I now imagine I don't commit, then ;-)

Thank you for your feedback and I'm checking a bit deeper the zepto point.
--
Camille


Reply via email to