Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add X-XSS-Protection HTTP response header to block potential XSS #267

Merged
merged 1 commit into from
Jan 24, 2021

Conversation

yassineaboukir
Copy link
Contributor

The #251 provides a solid defense but some older browsers don't support CSP therefore X-XSS-Protection implemented by Internet Explorer, Chrome and Safari will block any potential XSS attacks.

@codecov
Copy link

codecov bot commented Jan 22, 2021

Codecov Report

Merging #267 (306f1ff) into main (dd798db) will increase coverage by 0.02%.
The diff coverage is 100.00%.

Impacted file tree graph

@@            Coverage Diff             @@
##             main     #267      +/-   ##
==========================================
+ Coverage   87.27%   87.30%   +0.02%     
==========================================
  Files           6        6              
  Lines         503      504       +1     
==========================================
+ Hits          439      440       +1     
  Misses         36       36              
  Partials       28       28              
Impacted Files Coverage Δ
imageproxy.go 79.89% <100.00%> (+0.10%) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update dd798db...306f1ff. Read the comment docs.

@willnorris willnorris merged commit 2203979 into willnorris:main Jan 24, 2021
@willnorris
Copy link
Owner

thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants