CSP 请求头构建器

可视化构建 Content-Security-Policy 请求头,选择指令和来源值,复制 CSP 头部或服务器配置片段。

预设:
启用指令来源值
default-src
script-src
style-src
img-src
font-src
connect-src
media-src
object-src
frame-src
worker-src
manifest-src
form-action
frame-ancestors
base-uri
upgrade-insecure-requests标志指令(无来源)
block-all-mixed-content标志指令(无来源)

输出

Content-Security-Policy
请在上方启用至少一个指令
nginx
请在上方启用至少一个指令
Apache (.htaccess)
请在上方启用至少一个指令

What Is the CSP Header Builder?

The CSP Header Builder is a visual tool for constructing Content-Security-Policy HTTP headers. Select the directives you need, toggle the allowed source values, and instantly get a correctly formatted CSP string ready to paste into your server config.

No more manually typing default-src 'self'; script-src 'self' ... — the builder handles the formatting and gives you nginx and Apache snippets as a bonus.

How to Use the CSP Header Builder

  1. Choose a preset (Strict, Moderate, or SPA/CDN) as a starting point.
  2. Enable the directives you need by checking the toggle on the left.
  3. Click source values (like 'self', https:) to add them to the directive.
  4. Use the custom input at the end of each row to add specific domains.
  5. Copy the generated CSP header value, or use the nginx / Apache snippets directly.
  6. Optionally enable Report-Only mode to test the policy without enforcing it.

Features

  • 16 CSP directives covered including default-src, script-src, frame-ancestors, and more
  • All common source values as one-click toggles
  • Custom domain input per directive
  • 3 built-in presets: Strict, Moderate, SPA/CDN
  • Toggle between CSP and CSP-Report-Only mode
  • Output formats: raw header value, nginx add_header, Apache Header set
  • One-click copy for each output format

FAQ

What is a Content-Security-Policy header?

Content-Security-Policy (CSP) is an HTTP response header that tells browsers which content sources are allowed to load on your page. It's the primary defense against Cross-Site Scripting (XSS) and data injection attacks.

What is Content-Security-Policy-Report-Only?

The Report-Only variant sends the CSP header but doesn't enforce it — violations are reported to the browser console or a report-uri endpoint. Use it to test a new policy before enforcing it in production.

What does 'unsafe-inline' mean in CSP?

'unsafe-inline' allows inline scripts and styles. It significantly weakens XSS protection and should be avoided. Use nonces or hashes instead to allow specific inline code blocks.

What is default-src used for?

default-src is a fallback directive. Any fetch directive (script-src, style-src, img-src, etc.) that isn't explicitly defined will fall back to the value of default-src.