How it works in practice
Example of detected incident
{
"referrer": "https://your-store.com/",
"blocked-uri": "inline",
"disposition": "enforce",
"line-number": 15,
"source-file": "https://your-store.com/checkout/payment",
"status-code": 200,
"document-uri": "https://your-store.com/checkout/payment",
"script-sample": "",
"original-policy": "default-src 'self'; style-src 'self'; img-src 'self'; font-src 'self'; connect-src 'self'; frame-ancestors 'self'; frame-src 'self'; child-src 'self'; worker-src 'none'; report-uri https://monitor.firstoken.co/v1/pages/E8178B09AF?t=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...",
"violated-directive": "script-src-elem",
"effective-directive": "script-src-elem"
}Types of attacks we detect
Last updated