-
Notifications
You must be signed in to change notification settings - Fork 9.5k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
new_audit: ensure clickjacking mitigation through XFO or CSP #16290
new_audit: ensure clickjacking mitigation through XFO or CSP #16290
Conversation
…ve self or none, but any value to relax the framing.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you revert your changes to cli/test/smokehouse/frontends/smokehouse-bin.js
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There are still changes to smokehouse-bin.js, not sure why but can you revert them?
…n9er/lighthouse into lighthouse-clickjacking
Thanks for your help, Adam! Should work now. |
Are any of the errors related to this audit? To me it looks like no, but maybe implicitly? |
Some of them yes, but it was just some minor audit count / snapshot stuff. The other failures are unrelated and blocked on #16301 |
Summary
Adding a new audit to Ligththouse, which detects missing Clickjacking mitigation through the X-Frame-Options or Content-Security-Policy HTTP header.
Part of a larger change to introduce more similar header deployments.
Similar to the HSTS audit (#16257), the description contains a placeholder doc link until the internal doc is approved. @adamraine FYI