Mozilla Observatory Edits for Vuepress with Netlify Deploy

(Oop, this was from when this site was a VuePress site. I have since just made my own static site generator. Info still valid, and I'll update this 2 detail doing the same.)

I ran mozilla observatory for this site. Here was my report, and how I fixed it, with notes… note: easy to break things by fiddling with these things, but what better way to learn : ).

mozilla observatory

I use VuePress + netlify to deploy this site. Every push to master runs vuepress build src and then netlify takes care of serving the static assets.


To specify header rules, u create a netlify.toml file at the base of your build dir. Here are all available values. For vuepress this will be a sibling of package.json.

  for = "/*"
    X-Content-Type-Options = "nosniff"
    X-Frame-Options = "DENY"
    X-XSS-Protection = "1; mode=block"
    Content-Security-Policy = "default-src 'none'; img-src 'self'; script-src 'self'; style-src 'self'"

This brought my grade from a D to a B.


Don't guess the MIME types of files delivered. MIME sniffing is when u inspect the contents of a byte-stream to try and deduce its file format.

Here's a great SO explanation.


Sez whether or not your site can be framed. Prevents clickjacking. Clickjacking makes it look like someone is clicking a link on site A, when really its site B666. Saying DENY disallows attempts to iframe the site.

Superseded by content-security-policy's frame-ancestors attribute but still graded/used (guess which browser lies behind this).


Blocks pages from loading when the browser detects an X-XSS attack. Will maybe come back to this and figure out how : ) Maybe.


Allows fine-grained control of where resources can be loaded from. But, from mozilla:

Note that disabling inline JavaScript means that all JavaScript must be loaded from <script> src tags . Event handlers such as onclick used directly on a tag will fail to work, as will JavaScript inside <script> tags but not loaded via src. Furthermore, inline stylesheets using either <style> tags or the style attribute will also fail to load. As such, care must be taken when designing sites so that CSP becomes easier to implement.

notes on CSP

I got an A+!, but:

It disallowed youtube, tweets, and images from cloudinary to be embedded, stripped my css, and broke service worker. This was all tellingly detailed in the console:

I actually liked the stripped down version of the CSS, the service worker was just a VuePress out of the box thing, and to fix the other issues, you just specify trusted domains like so:

img-src # for any site '*'

I also had the netlify CMS script inlined:

if (window.netlifyIdentity) {
   window.netlifyIdentity.on("init", user => {
     if (!user) {
       window.netlifyIdentity.on("login", () => {
         document.location.href = "/admin/";

This was the final CSP:

Content-Security-Policy = "default-src 'none'; img-src *; script-src; style-src 'self'"

Edit: that didn't actually work, I found this much better article about all this and commented out CSP for now because I'm gonna go eat some mashed potatoes.

: )