Would love to have feedback on if there is a way to implement this CSP - anyone knows or has an idea?
Hey @Portal Support
Shauna here from Support!
I’ve gone ahead and opened a conversation with one of our support engineers to help you with this 
They’ll be in touch with you soon!
Will update this thread with information as soon as this is resolved with support!
Hey @Portal Support
Shauna here from Support!
I’ve gone ahead and opened a conversation with one of our support engineers to help you with this 
They’ll be in touch with you soon!
Will update this thread with information as soon as this is resolved with support!
Any updates on this? I’m in a similar boat. Adding 100+ hashes that won’t survive an update isn’t a sustainable strategy.
Experiencing the same issue. Help article seems to be out of date too.
Can we get an update on this?
Regarding the original question here is the response from the Support Team:
- Yes, a default-src directive can be included in the CSP

- Our article lists all of the domains you'd need to allow under the script and style directives
For your third point- unfortunately, removing the 'unsafe-inline' keyword from the `style-src` directive may cause compatibility issues with the Intercom Messenger app. It's important to note that the 'unsafe-inline' keyword allows inline styles to be executed, which is necessary for the proper rendering of the app.
@Portal Support @Shauna @Tom Cunningham @Tanya @Jacob Cox this is a security risk that has not been mitigated yet by Intercom. This is discussed in multiple threads. I created an item on the Product Wishlist for this CSP/unsafe-inline issue, to hopefully get it prioritised.
Please upvote (and/or add your thoughts):
Thanks!