Rationale
Make sure to always verify that your external resources are delivered without unexpected third-party manipulation and avoid any malicious changes of any kind at all to the fetched files.
โ
Scope
Third-party resources
Detect subresource integrity vulnerabilities.
Make sure to always verify that your external resources are delivered without unexpected third-party manipulation and avoid any malicious changes of any kind at all to the fetched files.
โ
Third-party resources