Skip to content

Conversation

@hackall360
Copy link
Contributor

  • Move Content-Security-Policy from meta tags to _headers file
  • Add frame-ancestors 'none' (only works in HTTP headers)
  • Fix font-src to allow data: URIs
  • Add contact.unityailab.com to connect-src
  • Add base-uri and form-action directives

Externalize inline scripts for CSP compliance:

  • page-init.js: Common FOUC prevention
  • home-init.js: Home page visitor tracking
  • ai/ai-init.js: AI page visitor count with auto-refresh
  • about/about-contact.js: About page contact form
  • apps/apps-init.js: Apps page initialization
  • contact/contact-form.js: Contact form with API fallback
  • services/services.js: Service modals and form

🤖 Generated with Claude Code

- Move Content-Security-Policy from meta tags to _headers file
- Add frame-ancestors 'none' (only works in HTTP headers)
- Fix font-src to allow data: URIs
- Add contact.unityailab.com to connect-src
- Add base-uri and form-action directives

Externalize inline scripts for CSP compliance:
- page-init.js: Common FOUC prevention
- home-init.js: Home page visitor tracking
- ai/ai-init.js: AI page visitor count with auto-refresh
- about/about-contact.js: About page contact form
- apps/apps-init.js: Apps page initialization
- contact/contact-form.js: Contact form with API fallback
- services/services.js: Service modals and form

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
@hackall360 hackall360 merged commit 5a4b238 into main Nov 26, 2025
@hackall360 hackall360 deleted the develop branch November 26, 2025 23:28
@hackall360 hackall360 restored the develop branch November 26, 2025 23:28
Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Content-Security-Policy: default-src 'self'; script-src 'self' https://cdn.jsdelivr.net https://cdnjs.cloudflare.com https://unpkg.com; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://unpkg.com; font-src 'self' https://fonts.gstatic.com data:; img-src 'self' data: blob: https://image.pollinations.ai https://*.gravatar.com https://avatars.githubusercontent.com; connect-src 'self' https://text.pollinations.ai https://image.pollinations.ai https://users.unityailab.com https://api.github.com https://contact.unityailab.com; frame-ancestors 'none'; base-uri 'self'; form-action 'self'

P1 Badge Inline service modals blocked by new CSP

The new CSP header at line 7 removes 'unsafe-inline' from script-src, but the services page still uses inline onclick handlers to open its modals (e.g., services/index.html lines 565‑575). With this header served, browsers will block those inline handlers, so clicking any service card no longer calls openServiceModal, effectively breaking the modal interactions on the Services page.

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant