-
Notifications
You must be signed in to change notification settings - Fork 10.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove unsafe-eval
CSP Requirement for Blazor WASM
#37787
Comments
Unfortunately this is still an issue due to the Chrome bug: This resource helps detect if the chrome issue is resolved (WASM related, not blazor specific): https://s3.amazonaws.com/webassembly-chrome-csp/csp_test.html Others are having the same issue as well: element-hq/element-web#12262 |
unsafe-eval
CSP Requirement for Blazor WASM
We've moved this issue to the Backlog milestone. This means that it is not going to be worked on for the coming release. We will reassess the backlog following the current release and consider this item at that time. To learn more about our issue management process and to have better expectation regarding different types of issues you can read our Triage Process. |
@TanayParikh based on my testing with dotnet.7.0.0-preview.3.22175.4 the runtime still requires The original issue was closed and locked so I am hoping you might be able to reopen it. |
Can you please provide a link. |
I was referring to the issue that you have created and linked to from here. |
Just to show that its not a rare or low-impact issue. This issue is 100% blocking me from using Blazor in new projects. My company has a security requirement on things going into production that disallows us from using unsafe-eval. |
I second that. |
we need this fixed asap, cannot realistically use blazor wasm without this. |
I need to point out that this is a very important thing to fix in order for Blazor to be considered mature. Specifically, "eval()" in Javascript is considered insecure, but Blazor essentially runs via "eval()." It's quite critical to fix this, in the long-term, for a Blazor-powered site to be considered safe from XSS attacks. |
Runtime made the necessary changes that
unsafe-eval
may no longer be required for Blazor WASM: dotnet/runtime#59416Note, there's also a Chrome bug which may come into play here (WebAssembly/content-security-policy#7)
This issue tracks validating this fix, and the associated documentation updates.
Original CSP Issue: #34428
The text was updated successfully, but these errors were encountered: