Picto thématique

Rule n° 209 - Integrity control of third party resources is present and valid.

It is possible to verify that the third-party resources (files scripts, style sheets ...) have not been modified to insert malicious code. For this, the web client (browser in particular) will continuously check the sent files are the correct files. This rule encourages the implementation of this security measure.

#Development #Security

Goal

  • Prevent the appearance of malicious content or scripts on the site

Implementation

Use the integrity attribute of each link and script element (calling an external file) to provide the browser with the cryptographic hash (SRI hash) that should correspond with the file.

Find out more:

Control

Check for each link and script element (calling an external file) that the integrity attribute indicating the cryptographic hash (SRI hash) is present that should correspond with the file.

By Opquast - Read the license


Discover Opquast training and certification

The objective of these rules and the Opquast community mission is ‘making the web better’ for your customers and for everyone! Opquast rules cover the key major areas of risk that can negatively affect website users such as privacy, ecodesign, accessibility and security.

Opquast training has already allowed over 19,000 web professionals to have their skills certified. Train your teams, contact us

We offer a 1 hour free discovery module.