Skip to content
Discussion options

You must be logged in to vote

First, this is a warning, not breaking anything. The stronger CSP policy as per the HTTP header should still be applied (including sandbox), but we decided to also send it in the meta tag, in case someone runs privatebin by accident on a server that strips the HTTP header or replaces it with a less strict one.

Second, it should have stripped that part from the CSP in the meta tag, as we deal with that in:

// strip policies that are unsupported in meta tag
$metacspheader = str_replace(
array(
'frame-ancestors \'none\'; ',
'; sandbox allow-same-origin allow-scripts allow-forms allow-modals allow-downloads

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by rugk
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
2 participants