Rationale
Make sure to always verify that your external resources are delivered without unexpected third-party manipulation and avoid any malicious changes of any kind at all to the fetched files.
β
Scope
Third-party resources
Detect subresource integrity vulnerabilities.
Make sure to always verify that your external resources are delivered without unexpected third-party manipulation and avoid any malicious changes of any kind at all to the fetched files.
β
Third-party resources