SECURITY LAB Mode: VULNERABLE CSP: off AI: vulnerable LLM: openrouter VULNS ACTIVE

Client-Side Protection Demo

Test CSP headers, JavaScript tampering detection, and Magecart-style attacks.

CSP Status

Off

Current mode: off — Change via environment variable CSP_MODE=off|report|enforce

off
No Content-Security-Policy header (vulnerable)
report
CSP-Report-Only: reports violations but allows execution
enforce
Enforces CSP: blocks unauthorized scripts/styles

Inline Script Test

Test whether the browser's Content Security Policy blocks dynamically injected inline scripts.

When CSP is off, the injected script runs and modifies the DOM. When CSP is enforce, the browser blocks the script and logs a violation.

Magecart / Skimmer Simulation

Simulates injection of a malicious third-party script that steals payment data.

Demo Payment Form

How Magecart Works

  1. Click "Inject Skimmer" to load the malicious third-party script
  2. Enter fake card data in the form above
  3. Click outside a field (blur event) to trigger exfiltration
  4. View captured data in the "Skimmed Data" section
  5. Set CSP_MODE=enforce and retry — the script should be blocked

Skimmed Data

No skimmed data yet. Inject the skimmer and enter card details to see captured data.

CSP Violation Reports

csp-reports
No reports loaded. Click "Load Reports" to fetch CSP violation data.