Get policy for this URI: Load Policy
Document-URI: https://example.com/infested-page.html
Referrer (optional):
Violated Directive (after following fallbacks): default-src 'self' reporting enforce
Effective Directive (Type of directive whose enforcement caused the violation): child-src (<iframe>, <frame>, WebWorker) connect-src (XMLHttpRequest, WebSocket) font-src (CSS @font-face {src:url(…)}) frame-src (<iframe>, <frame>) img-src (<img>, CSS url(…)) manifest-src (Application Manifests) media-src (Video-, Audio-, Text-Tracks) prefetch-src (<link ref="prefetch|prerender">) object-src (<object>, <embed>, <applet>) script-src (<script> and on{event}-Attribute) script-src-attr (onevent-Attribute) script-src-elem (<script>) style-src (<style> and style-Attribute) style-src-attr (style-Attribute) style-src-elem (<style>) worker-src (Worker, SharedWorker, ServceWorker) base-uri (<base>) plugin-types (Mime-Types of media loaded by <object> and <embed>) form-action (<form action="...">) frame-ancestors (parents of <iframe> or <frame>) navigate-to
Blocked-URI (blocked from loading by CSP policy): https://example.org/ blob data eval inline
Filename: Dummy-Page
Script sample:
Policy as specified by the HTTP-header or <meta>-element: default-src 'self'; report-uri https://csp.example.org/csp
Create report
Report Text:
Report-Mime-Type: application/csp-report
Report receiver (Report-URI / Report-To): https://csp.example.org/csp
Send report