Content-Security-Policy Header and Nonce support

Prevent XSS attacks with the Content-Security-Policy header and nonce on script tags.
Even if you do not add the header, we need the nonce in the html template so for those who need to protect against xss attacks can add the header.

Include the Nonce in the CSP Header:
In the HTTP response headers, you need to include the generated nonce value in the script-src directive of your CSP policy. For example:Content-Security-Policy: script-src 'nonce-RANDOM_NONCE_VALUE’Replace RANDOM_NONCE_VALUE with the actual nonce value generated on the server.Add the Nonce to Script Elements:
In your HTML document, for each script that you want to allow to execute, you should include the nonce attribute with the same nonce value you generated. For example:Make sure to replace RANDOM_NONCE_VALUE with the actual nonce value you generated on the server. This associates the script element with the specific nonce declared in the CSP header.By following these steps, you ensure that only scripts with matching nonces will be allowed to execute, providing an additional layer of security against cross-site scripting (XSS) attacks.

+1

Try v2025, read: