Martina Kraus
Cross Site Scripting is yesterday's news, isn't it?
#1about 2 minutes
Demonstrating a persistent cross-site scripting attack
A live demo shows how malicious JavaScript can be injected into an input field and stored in a database, executing on every page load.
#2about 3 minutes
Why built-in framework sanitizers are not enough
Framework sanitizers can be bypassed by using native DOM APIs directly, and the vast majority of application code comes from third-party NPM packages.
#3about 4 minutes
Introducing the Content Security Policy http header
The Content Security Policy (CSP) is an HTTP header that controls which resources can be loaded and executed by the browser using directives for scripts, styles, and API connections.
#4about 4 minutes
Implementing and refining a basic content security policy
A live demo shows how to add a CSP via a meta tag and then iteratively fix broken styles and API calls by adjusting the `style-src` and `connect-src` directives.
#5about 3 minutes
Safely executing inline scripts with hashes and nonces
CSP Level 2 provides hashes and nonces as secure alternatives to `unsafe-inline` for whitelisting specific inline scripts for execution.
#6about 7 minutes
Using CSP nonces with server-side rendering
Nonces must be unique and randomly generated on the server for each request to be secure, and the `strict-dynamic` directive allows trusted scripts to load other scripts.
#7about 3 minutes
Introducing trusted types to secure dangerous dom sinks
Trusted Types is a new CSP directive that locks down dangerous DOM APIs, requiring that any data passed to them must first be sanitized and wrapped in a special trusted object.
#8about 3 minutes
Implementing trusted types with the dompurify library
Instead of writing custom sanitization logic, you can use a library like DOMPurify with its `RETURN_TRUSTED_TYPE` option to easily create secure, trusted HTML objects.
#9about 1 minute
Browser support and final recommendations for trusted types
Trusted Types are currently supported by all Chromium-based browsers, making it a viable defense-in-depth strategy for a significant portion of web users.
Related jobs
Jobs that call for the skills explored in this talk.
Featured Partners
Related Videos
Securing Frontend Applications with Trusted Types
Philippe De Ryck
A Primer in Single Page Application Security (Angular, React, Vue.js)
Thomas Konrad
101 Typical Security Pitfalls
Alexander Pirker
Security in modern Web Applications - OWASP to the rescue!
Jakub Andrzejewski
You click, you lose: a practical look at VSCode's security
Thomas Chauchefoin & Paul Gerste
Hack-Proof The Node.js runtime: The Mechanics and Defense of Path Traversal Attacks
Sonya Moisset
Friend or Foe? TypeScript Security Fallacies
Liran Tal
Vulnerable VS Code extensions are now at your front door
Raul Onitza-Klugman & Kirill Efimov
From learning to earning
Jobs that call for the skills explored in this talk.
Senior Full Stack Developer (Frontend Expertise)
Safe Labs
Berlin, Germany
Remote
Senior
React
NestJS
Node.js
Ethereum
+2
Fullstack developers .NET-Javascript
Plexus
Municipality of Santiago de Compostela, Spain
.NET
JavaScript
Senior Web Applications Developer - JavaScript / React / HTML
Adaptive Financial Consulting
Municipality of Madrid, Spain
CSS
HTML
React
JavaScript
TypeScript
Senior Web Applications Developer - JavaScript/React/HTML
Adaptive Financial Consulting
Barcelona, Spain
CSS
HTML
React
JavaScript
TypeScript





