csp_evaluator
Version:
Evaluate Content Security Policies for a wide range of bypasses and weaknesses
54 lines • 1.52 kB
TypeScript
export declare class Finding {
type: Type;
description: string;
severity: Severity;
directive: string;
value?: string | undefined;
constructor(type: Type, description: string, severity: Severity, directive: string, value?: string | undefined);
static getHighestSeverity(findings: Finding[]): Severity;
equals(obj: unknown): boolean;
}
export declare enum Severity {
HIGH = 10,
SYNTAX = 20,
MEDIUM = 30,
HIGH_MAYBE = 40,
STRICT_CSP = 45,
MEDIUM_MAYBE = 50,
INFO = 60,
NONE = 100
}
export declare enum Type {
MISSING_SEMICOLON = 100,
UNKNOWN_DIRECTIVE = 101,
INVALID_KEYWORD = 102,
NONCE_CHARSET = 106,
MISSING_DIRECTIVES = 300,
SCRIPT_UNSAFE_INLINE = 301,
SCRIPT_UNSAFE_EVAL = 302,
PLAIN_URL_SCHEMES = 303,
PLAIN_WILDCARD = 304,
SCRIPT_ALLOWLIST_BYPASS = 305,
OBJECT_ALLOWLIST_BYPASS = 306,
NONCE_LENGTH = 307,
IP_SOURCE = 308,
DEPRECATED_DIRECTIVE = 309,
SRC_HTTP = 310,
SRC_NO_PROTOCOL = 311,
EXPERIMENTAL = 312,
WILDCARD_URL = 313,
X_FRAME_OPTIONS_OBSOLETED = 314,
STYLE_UNSAFE_INLINE = 315,
STATIC_NONCE = 316,
SCRIPT_UNSAFE_HASHES = 317,
STRICT_DYNAMIC = 400,
STRICT_DYNAMIC_NOT_STANDALONE = 401,
NONCE_HASH = 402,
UNSAFE_INLINE_FALLBACK = 403,
ALLOWLIST_FALLBACK = 404,
IGNORED = 405,
REQUIRE_TRUSTED_TYPES_FOR_SCRIPTS = 500,
REPORTING_DESTINATION_MISSING = 600,
REPORT_TO_ONLY = 601
}
//# sourceMappingURL=finding.d.ts.map