Content-Security-Policy: sandbox directive
        
        
          
                Baseline
                
                  Widely available
                
                
              
        
        
        
          
                
              
                
              
                
              
        
        
      
      This feature is well established and works across many devices and browser versions. It’s been available across browsers since November 2016.
The HTTP Content-Security-Policy (CSP) sandbox directive enables a sandbox for the requested resource similar to the <iframe> sandbox attribute.
It applies restrictions to a page's actions including preventing popups, preventing the execution of plugins and scripts, and enforcing a same-origin policy.
| CSP version | 1.1 / 2 | 
|---|---|
| Directive type | Document directive | 
| This directive is not supported in the <meta>element or by theContent-Security-policy-Report-Onlyheader field. | |
Syntax
Content-Security-Policy: sandbox;
Content-Security-Policy: sandbox <value>;
where <value> can optionally be one of the following values:
- allow-downloads
- 
Allows downloading files through an <a>or<area>element with the download attribute, as well as through the navigation that leads to a download of a file. This works regardless of whether the user clicked on the link, or JS code initiated it without user interaction.
- allow-forms
- 
Allows the page to submit forms. If this keyword is not used, form will be displayed as normal, but submitting it will not trigger input validation, sending data to a web server or closing a dialog. 
- allow-modals
- 
Allows the page to open modal windows by Window.alert(),Window.confirm(),Window.print()andWindow.prompt(), while opening a<dialog>is allowed regardless of this keyword. It also allows the page to receiveBeforeUnloadEventevent.
- allow-orientation-lock
- 
Lets the resource lock the screen orientation. 
- allow-pointer-lock
- 
Allows the page to use the Pointer Lock API. 
- allow-popups
- 
Allows popups (created, for example, by Window.open()ortarget="_blank"). If this keyword is not used, popup display will silently fail.
- allow-popups-to-escape-sandbox
- 
Allows a sandboxed document to open new windows without forcing the sandboxing flags upon them. This will allow, for example, a third-party advertisement to be safely sandboxed without forcing the same restrictions upon the page the ad links to. 
- allow-presentation
- 
Allows embedders to have control over whether an iframe can start a presentation session. 
- allow-same-origin
- 
Allows a sandboxed resource to retain its origin. A sandboxed resource is otherwise treated as being from an opaque origin, which ensures that it will always fail same-origin policy checks, and hence cannot access localstorageanddocument.cookieand some JavaScript APIs. TheOriginof sandboxed resources without theallow-same-originkeyword isnull.
- allow-scripts
- 
Allows the page to run scripts (but not create pop-up windows). If this keyword is not used, this operation is not allowed. 
- allow-storage-access-by-user-activationExperimental
- 
Lets the resource request access to the parent's storage capabilities with the Storage Access API. 
- 
Lets the resource navigate the top-level browsing context (the one named _top).
- 
Lets the resource navigate the top-level browsing context, but only if initiated by a user gesture. 
- 
Allows navigations to non- httpprotocols built into browser or registered by a website. This feature is also activated byallow-popupsorallow-top-navigationkeyword.
Note:
The allow-top-navigation and related values only make sense for embedded documents (such as child iframes). For standalone documents, these values have no effect, as the top-level browsing context is the document itself.
Examples
Content-Security-Policy: sandbox allow-scripts;
Specifications
| Specification | 
|---|
| Content Security Policy Level 3> # directive-sandbox> | 
Browser compatibility
Loading…
See also
- Content-Security-Policy
- sandboxattribute on- <iframe>elements