Hello,
Based on the documentation (https://www.intercom.com/help/en/articles/3894-using-intercom-with-content-security-policy), it appears that both unsafe-inline
and unsafe-eval
need to be added to our Content Security Policy in order for the JavaScript widget to function.
From a security perspective, this raises serious concerns, as it increases the attack surface. Our reporting endpoint shows that unsafe-inline
isn’t actually required by your code, but unsafe-eval
is being triggered in the vendors-app-modern.js
file at the following line:
var mod = eval("quire".replace(/^/, "re"))(moduleName);
Is there any way to eliminate this eval
call? If not, we may need to reconsider our use of Intercom due to these security implications.
Best regards,
Salim