How it works in practice

Example of detected incident

When someone tries to inject malicious code into your payment page, Firstoken Monitor will detect the violation and you'll receive a report like this:

{
  "referrer": "https://your-store.com/",
  "blocked-uri": "inline",
  "disposition": "enforce",
  "line-number": 15,
  "source-file": "https://your-store.com/checkout/payment",
  "status-code": 200,
  "document-uri": "https://your-store.com/checkout/payment",
  "script-sample": "",
  "original-policy": "default-src 'self'; style-src 'self'; img-src 'self'; font-src 'self'; connect-src 'self'; frame-ancestors 'self'; frame-src 'self'; child-src 'self'; worker-src 'none'; report-uri https://monitor.firstoken.co/v1/pages/E8178B09AF?t=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...",
  "violated-directive": "script-src-elem",
  "effective-directive": "script-src-elem"
}

What does this report mean?

  • An unauthorized inline script attempted to execute on line 15

  • The CSP successfully blocked the execution (disposition: enforce)

  • The incident was automatically reported to Firstoken Monitor

  • Your team received an immediate email alert

Types of attacks we detect

Firstoken Monitor's advanced analysis engine can identify and classify multiple types of security threats:

High Priority Violations:

  1. Nonce/Hash Violations: Compromised security tokens or integrity checks.

  2. XSS Script Injection: External malicious JavaScript injection.

  3. XSS Inline Script Injection: Unauthorized inline script execution.

Code Injection Attacks:

  1. Not permitted use of Eval(): Dangerous eval() function usage.

  2. XSS Data Injection: Data-based cross-site scripting attempts.

  3. Iframe Injection: Malicious iframe embedding.

  4. Style Injection: CSS-based attacks.

  5. Inline Style Injection: Unauthorized inline styling.

  6. Malicious Worker: Web worker exploitation.

Advanced Threats:

  1. Data Exfiltration: Unauthorized data transmission attempts

  2. Clickjacking: UI redressing attacks

  3. Not allowed Image: Suspicious image loading from unauthorized sources

Each detected violation is automatically classified, prioritized, and reported with detailed context to help your security team respond quickly and effectively.

Last updated

Was this helpful?