Path: blob/main/files/en-us/web/http/headers/content-security-policy/script-src-attr/index.md
6524 views
------{{HTTPSidebar}}
The HTTP {{HTTPHeader("Content-Security-Policy")}} (CSP) script-src-attr directive specifies valid sources for JavaScript inline event handlers.
This directive only specifies valid sources for inline script event handlers like onclick. It does not apply to other JavaScript sources that can trigger script execution, such as URLs loaded directly into {{HTMLElement("script")}} elements and XSLT stylesheets. (Valid sources can be specified for all JavaScript script sources using {{CSP("script-src")}}, or just for <script> elements using {{CSP("script-src-elem")}}.)
| CSP version | 3 |
|---|---|
| Directive type | {{Glossary("Fetch directive")}} |
| {{CSP("default-src")}} fallback |
Yes.
If this directive is absent, the user agent will look for the {{CSP("script-src")}} directive, and if both of them are absent, fallback to default-src directive.
|
Syntax
One or more sources can be allowed for the script-src-attr policy:
script-src-attr can be used in conjunction with {{CSP("script-src")}}, and will override that directive for checks on inline handlers:
Sources
<source> can be any one of the values listed in CSP Source Values.
Note that this same set of values can be used in all {{Glossary("fetch directive", "fetch directives")}} (and a number of other directives).
Examples
Violation case
Given this CSP header:
…the following inline event handler is blocked and won't be loaded or executed:
Note that generally you should replace inline event handlers with {{domxref("EventTarget.addEventListener", "addEventListener")}} calls:
Specifications
{{Specifications}}
Browser compatibility
{{Compat}}
See also
{{HTTPHeader("Content-Security-Policy")}}
{{HTMLElement("script")}}
{{CSP("script-src")}}
{{CSP("script-src-elem")}}