A CSP that survives your bundler, your CDN, and your auth wall.
- Render in Chromium so the policy reflects what your bundle actually loads.
- Get nonce, hash, and strict-dynamic guidance grounded in your code.
- Cover authenticated routes with monitoring, not just the public ones.
Consepo Workflow
App rollout pipeline
- 1Browser-executed crawl of public routes
- 2Directive-by-directive review of script and style sources
- 3Monitoring for authenticated and dynamic flows
- 4Export targets for Workers, edge functions, and origin servers
Stop guessing about script-src
Modern bundlers split code in ways static analysis can't see. A rendered crawl captures every chunk, vendor library, and CDN origin that actually runs.
Choose nonces, hashes, and strict-dynamic with evidence
Inline patterns, framework injections, and third-party loaders each have different mitigations. Consepo shows what's running so you can pick the right strategy per directive.
Cover the routes a crawler never sees
Authenticated dashboards, settings pages, and personalized views only load their full set of scripts during real sessions. Monitoring catches those without you having to record fixtures.
Workflow
How this fits the Consepo rollout
Step 1
Crawl the public surface in a real browser
Consepo loads each route the way a user does and records every script, style, font, and frame the bundler resolves at runtime.
Step 2
Decide on directive strategies
Pick where nonces, hashes, or strict-dynamic make sense based on the inline and dynamic code your app actually ships.
Step 3
Roll out and monitor authed flows
Deploy in Report-Only, let monitoring watch the rest of the app, then enforce once the production picture stabilizes.
Deliverables
What teams get out of it
- A CSP rooted in what your bundle and CDN actually load
- Strategy guidance for nonces, hashes, and strict-dynamic
- Coverage that extends past the login wall