CSP: child-src

The HTTP Content-Security-Policy (CSP) child-src directive defines the valid sources for web workers and nested browsing contexts loaded using elements such as <frame> and <iframe>. For workers, non-compliant requests are treated as fatal network errors by the user agent.

CSP version 2
Directive type Fetch directive
default-src fallback Yes. If this directive is absent, the user agent will look for the default-src directive.

Syntax

One or more sources can be allowed for the child-src policy:

http
Content-Security-Policy: child-src <source>;
Content-Security-Policy: child-src <source> <source>;

Sources

<source> can be any one of the values listed in CSP Source Values.

Note that this same set of values can be used in all fetch directives (and a number of other directives).

Examples

Violation cases

Given this CSP header:

http
Content-Security-Policy: child-src https://example.com/

This <iframe> and worker are blocked and won't load:

html
<iframe src="https://not-example.com"></iframe>

<script>
  const blockedWorker = new Worker("data:application/javascript,…");
</script>

Specifications

Specification
Content Security Policy Level 3
# directive-child-src

Browser compatibility

BCD tables only load in the browser

See also