Sandbox security tests complain about unsafe usage in Content Security Policy(CSP)
Content Security Policy (CSP) implemented, but allows 'unsafe-eval' and allows forms to be submitted to any source.
'unsafe-eval' - 'unsafe-eval' allows the execution of code injected into DOM APIs such as eval().
This policy allows inline styles ('unsafe-inline'). Although they are not as bad as inline scripts in terms of security, an injection bug in script area would allow the attacker to modify page appearance.
See :
We need to investigate about that.
Sandbox security tests complain about unsafe usage in Content Security Policy(CSP)
See :
We need to investigate about that.