CSP Unblock troch Balvin
No more Content-Security-Policy limitations. This extension removes all CSP-related headers during website testing.
Beskikber yn Firefox foar Android™Beskikber yn Firefox foar Android™
8 brûkers8 brûkers
Metadata útwreiding
Skermôfbyldingen
Oer dizze útwreiding
This extension removes the following CSP-related response headers to remove limitations caused by CSP.
Use Cases:
1. This extension can temporarily remove the limitations of CSP so that the developer can test inline and remote scripts. Also, you can load different cross-origin resources without any limitation.
2. Allow a website to load a remote worker script
3. Allow a website to play remote media
Notes:
1. Disable the extension when you are browsing the internet. By removing CSP, the website's protection reduces significantly which might harm you.
2. The extension removes specified CSP-related headers from the top-frame and all sub-frame elements
Definitions:
"content-security-policy" header: The HTTP Content-Security-Policy response header allows website administrators to control resources the user agent is allowed to load for a given page. With a few exceptions, policies mostly involve specifying server origins and script endpoints. This helps guard against cross-site scripting attacks (Cross-site_scripting).
"content-security-policy-report-only" header: The HTTP Content-Security-Policy-Report-Only response header allows web developers to experiment with policies by monitoring (but not enforcing) their effects. These violation reports consist of JSON documents sent via an HTTP POST request to the specified URI.
- "content-security-policy" header
- "content-security-policy-report-only" header
- "x-webkit-csp" and "x-webkit-csp-report-only" headers
- "x-content-security-policy" and "x-content-security-policy-report-only" headers
- reporting APIs ("report-to" and "reporting-endpoints")
Use Cases:
1. This extension can temporarily remove the limitations of CSP so that the developer can test inline and remote scripts. Also, you can load different cross-origin resources without any limitation.
2. Allow a website to load a remote worker script
3. Allow a website to play remote media
Notes:
1. Disable the extension when you are browsing the internet. By removing CSP, the website's protection reduces significantly which might harm you.
2. The extension removes specified CSP-related headers from the top-frame and all sub-frame elements
Definitions:
"content-security-policy" header: The HTTP Content-Security-Policy response header allows website administrators to control resources the user agent is allowed to load for a given page. With a few exceptions, policies mostly involve specifying server origins and script endpoints. This helps guard against cross-site scripting attacks (Cross-site_scripting).
"content-security-policy-report-only" header: The HTTP Content-Security-Policy-Report-Only response header allows web developers to experiment with policies by monitoring (but not enforcing) their effects. These violation reports consist of JSON documents sent via an HTTP POST request to the specified URI.
Wurdearre: 0 troch 0 beoardielers
Tastimmingen en gegevens
Fereaske machtigingen:
- Ynhâld op elke side blokkearje
Opsjonele machtigingen:
- Jo gegevens foar alle websites benaderje
Gegevenssamling:
- De ûntwikkeler seit dat dizze útwreiding gjin gegevenssamling fereasket.
Mear ynformaasje
- Add-on-keppelingen
- Ferzje
- 0.1.4
- Grutte
- 123,98 KB
- Lêst bywurke
- ien moanne lyn (5 jan. 2026)
- Sibbe kategoryen
- Lisinsje
- Mozilla Public License 2.0
- Ferzjeskiednis
- Tafoegje oan kolleksje