CSP for AppNexus (now Xandr)
Using AppNexus (now Xandr) with Content Security Policy
A popular advertising network for personalized retargeting.
Allow these directives in your CSP, to support AppNexus (now Xandr) in your Content Security Policy:
script-src
https://*.adnxs.com
https://*.adnxs-simple.com
https://tag.yieldoptimizer.com;
frame-src
data:
*.adnxs.com;
child-src
data:
*.adnxs.com;
img-src
*.adnxs.com
*.adnxs-simple.com
*.yieldoptimizer.com
about:;
font-src
data:;
connect-src
*.adnxs.com
*.adnxs-simple.com;
base-uri
*.adnxs.com;
media-src
*.adnxs.com
*.adnxs-simple.com;
The main domains used by AppNexus (now Xandr) are:
adnxs.com
adnxs-simple.com
adnxs.net
yieldoptimizer.com
Example Content-Security-Policy violations / reports:
Using the above CSP package, will fix these errors that you may be seeing in your console logs:
script-src
/script-src-elem
/script-src-attr
violations
Refused to load the script 'https://cdn.adnxs.com/v/s/212/trk.js' because it violates the following Content Security Policy directive: "script-src 'self' 'report-sample'". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback.
If you see inline script errors, you need to add SHA-256 hashes / nonces to your CSP with RapidSec:
Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'self' 'report-sample'". Either the 'unsafe-inline' keyword, a hash ('sha256-RFWPLDbv2BY+rCkDzsE+0fr8ylGr2R2faWMhq4lfEQc='), or a nonce ('nonce-...') is required to enable inline execution.
If you see inline eval() errors, RapidSec will generate your CSP with the specific content of the errors:
Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "script-src 'self' 'report-sample'".
style-src
/style-src-elem
/style-src-attr
violations
Refused to load the stylesheet 'adnxs.com' because it violates the following Content Security Policy directive: "style-src 'self' 'report-sample'". Note that 'style-src-elem' was not explicitly set, so 'style-src' is used as a fallback.
If you see inline style errors, you need to add SHA-256 hashes / nonces to your CSP with RapidSec:
Refused to apply inline style because it violates the following Content Security Policy directive: "style-src 'self' 'report-sample'". Either the 'unsafe-inline' keyword, a hash ('sha256-RFWPLDbv2BY+rCkDzsE+0fr8ylGr2R2faWMhq4lfEQc='), or a nonce ('nonce-...') is required to enable inline execution.
font-src
violations
Refused to load the font 'adnxs.com' because it violates the following Content Security Policy directive: "font-src 'self'"
img-src
violations
Refused to load the image 'adnxs.com' because it violates the following Content Security Policy directive: "img-src 'self'".
frame-src
violations
[Report Only] Refused to frame 'adnxs.com' because it violates the following Content Security Policy directive: "frame-src 'self'".
form-action
violations
[Report Only] Refused to send form data to 'adnxs.com' because it violates the following Content Security Policy directive: "form-action 'self'".
connect-src
violations
[Report Only] Refused to connect to 'adnxs.com' because it violates the following Content Security Policy directive: "connect-src 'self'"