Dear Isomorphic Team,
I am writing to request official documentation and technical clarification regarding SmartClient’s Content Security Policy (CSP) requirements, specifically the need for unsafe-eval and/or unsafe-inline.
In particular, we are looking for detailed information on:
If there are existing whitepapers, security guides that can address these topics, we would greatly appreciate access to them.
Alternatively, a formal statement or knowledge base article covering the above points would also be very helpful.
Thank you in advance for your assistance and for any materials you can provide.
Best regards,
Azar
I am writing to request official documentation and technical clarification regarding SmartClient’s Content Security Policy (CSP) requirements, specifically the need for unsafe-eval and/or unsafe-inline.
In particular, we are looking for detailed information on:
- Why SmartClient requires unsafe-eval and/or unsafe-inline in the CSP.
- What specific technical mechanisms ensure that this usage is safe, including:
- How dynamic code generation is performed
- What guarantees exist that no user‑controlled input is ever executed
- What internal sandboxing, validation, or controlled execution paths are used
- Any architectural constraints that prevent exploitation
If there are existing whitepapers, security guides that can address these topics, we would greatly appreciate access to them.
Alternatively, a formal statement or knowledge base article covering the above points would also be very helpful.
Thank you in advance for your assistance and for any materials you can provide.
Best regards,
Azar
Comment