CSP Evaluator Core NPM Library
Introduction
Please note: this is a porting of the original CSP evaluator library.
This is not an official Google product.
CSP Evaluator allows developers and security experts to check if a Content Security Policy (CSP) serves as a strong mitigation against cross-site scripting attacks. It assists with the process of reviewing CSP policies, and helps identify subtle CSP bypasses which undermine the value of a policy. CSP Evaluator checks are based on a large-scale study and are aimed to help developers to harden their CSP and improve the security of their applications. This tool (also available as a Chrome extension) is provided only for the convenience of developers and Google provides no guarantees or warranties for this tool.
CSP Evaluator comes with a built-in list of common CSP whitelist bypasses which reduce the security of a policy. This list only contains popular bypasses and is by no means complete.
The CSP Evaluator library + frontend is deployed here: https://csp-evaluator.withgoogle.com/
Example usage
const csp = require("@doyensec/csp-evaluator")
var rawCsp = "script-src data: https://www.google.com;";
var parser = new csp.CspParser(rawCsp);
var evaluator = new csp.CspEvaluator(parser.csp, csp.Version.CSP3);
var findings = evaluator.evaluate();
console.log(findings);
Credits
This package is used by Electronegativity. Electronegativity has been sponsored by Doyensec LLC.