web.archive.org/web/20170602232026/http:/githubengineering.com/githubs-csp-journey
Preview meta tags from the web.archive.org website.
Linked Hostnames
1Search Engine Appearance
GitHub’s CSP journey
We shipped subresource integrity a few months back to reduce the risk of a compromised CDN serving malicious JavaScript. That is a big win, but does not address related content injection issues that may exist on GitHub.com itself. We have been tackling this side of the problem over the past few years and thought it would be fun, and hopefully useful, to share what we have been up to.
Bing
GitHub’s CSP journey
We shipped subresource integrity a few months back to reduce the risk of a compromised CDN serving malicious JavaScript. That is a big win, but does not address related content injection issues that may exist on GitHub.com itself. We have been tackling this side of the problem over the past few years and thought it would be fun, and hopefully useful, to share what we have been up to.
DuckDuckGo
GitHub’s CSP journey
We shipped subresource integrity a few months back to reduce the risk of a compromised CDN serving malicious JavaScript. That is a big win, but does not address related content injection issues that may exist on GitHub.com itself. We have been tackling this side of the problem over the past few years and thought it would be fun, and hopefully useful, to share what we have been up to.
General Meta Tags
8- titleGitHub’s CSP journey - GitHub Engineering
- content-typetext/html; charset=utf-8
- viewportwidth=device-width, initial-scale=1.0, maximum-scale=1
- octolytics-app-idinternal-engineering-blog
- descriptionWe shipped subresource integrity a few months back to reduce the risk of a compromised CDN serving malicious JavaScript. That is a big win, but does not address related content injection issues that may exist on GitHub.com itself. We have been tackling this side of the problem over the past few years and thought it would be fun, and hopefully useful, to share what we have been up to.
Open Graph Meta Tags
5- og:titleGitHub’s CSP journey
- og:descriptionWe shipped subresource integrity a few months back to reduce the risk of a compromised CDN serving malicious JavaScript. That is a big win, but does not address related content injection issues that may exist on GitHub.com itself. We have been tackling this side of the problem over the past few years and thought it would be fun, and hopefully useful, to share what we have been up to.
- og:urlhttps://web.archive.org/web/20170316065128/https://githubengineering.com/githubs-csp-journey/
- og:site_nameGitHub Engineering
- og:typearticle
Twitter Meta Tags
3- twitter:cardsummary
- twitter:site@GitHubEng
- twitter:creator@patricktoomey
Link Tags
12- alternatehttps://web.archive.org/web/20170316065128/https://githubengineering.com/atom.xml
- canonicalhttps://web.archive.org/web/20170316065128/https://githubengineering.com/githubs-csp-journey/
- profilehttp://gmpg.org/xfn/11
- shortcut icon/web/20170316065128im_/https://githubengineering.com/images/favicon.ico
- stylesheethttps://web-static.archive.org/_static/css/banner-styles.css?v=1B2M2Y8A
Links
32- https://web.archive.org/web/20170316065128/http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1420
- https://web.archive.org/web/20170316065128/http://githubengineering.com/subresource-integrity
- https://web.archive.org/web/20170316065128/http://lcamtuf.coredump.cx/postxss
- https://web.archive.org/web/20170316065128/http://twitter.com/GitHubEng
- https://web.archive.org/web/20170316065128/https://bounty.github.com