Closed
Description
I believe that, since the threat model of CSP is "someone is able to inject script into my page but I still want to prevent bad things from happening", we need import maps to be controlled by CSP as well. If a malicious actor can inject an import map, then they can change the behavior of scripts on the page (similar to overwriting self.fetch()
, or inserting a <base>
tag, or similar). So CSP should stop that as well.
This issue can be closed when there is an actual spec which includes these protections.
Metadata
Assignees
Labels
No labels