From 4bc2f0f7af0156eb7cbf2de98c737c6cc753cfa1 Mon Sep 17 00:00:00 2001 From: Dipak Panchal <31427462+dipakpanchal05@users.noreply.github.com> Date: Sun, 4 Jan 2026 21:20:08 +0530 Subject: [PATCH] Update Bypass_CSP.md --- XSS/Bypass_CSP.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/XSS/Bypass_CSP.md b/XSS/Bypass_CSP.md index 779d171..5d77228 100644 --- a/XSS/Bypass_CSP.md +++ b/XSS/Bypass_CSP.md @@ -126,6 +126,13 @@ By modifying the `script-src` directive, an attacker can include a malicious dom --- +## Tool +- **Link:** [CSP Validator by th3.d1p4k](https:cspvalidator.netlify.app) + +**Reference Links:** +- **Link1:** [OWASP CSP](https://owasp.org/www-community/controls/Content_Security_Policy#:~:text=CSP%20Validator) +- **Link2:** [OWASP WSTG](https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/12-Test_for_Content_Security_Policy#:~:text=CSP%20Validator) + ## Author For further information or discussions, feel free to reach out to: