Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update description of xssFilter for helmet in best-practice-security.md #1248

Merged
merged 1 commit into from
Mar 2, 2021

Conversation

cseas
Copy link
Contributor

@cseas cseas commented Mar 2, 2021

The helmet package disables the XSS filter built into web browsers by setting the X-XSS-Protection header's value to 0.
https://github.com/helmetjs/helmet#reference

The filter has been retired in Chrome & Edge, and Firefox has refused to implement it due to known issues:
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection

The recommended practice is to disable the built-in filter and use alternate methods for protecting against XSS attacks like using a CSP header, sanitize inputs, etc.

Copy link
Contributor

@dougwilson dougwilson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks!

@dougwilson dougwilson closed this in 8e82322 Mar 2, 2021
@dougwilson dougwilson merged commit 8e82322 into expressjs:gh-pages Mar 2, 2021
@github-pages github-pages bot temporarily deployed to github-pages March 2, 2021 17:02 Inactive
@cseas cseas deleted the patch-1 branch March 3, 2021 07:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants