{"json_modified": "2016-08-05T02:40:45.664910", "uuid": "3bc14a52-0fea-4ba0-ab57-6b622a50c78f", "title": "Using CSP violation reports", "url": "/en-US/docs/Web/Security/CSP/Using_CSP_violation_reports", "tags": ["Security", "Content Security Policy"], "translations": [{"uuid": "12af6131-5b9e-47c8-9b50-95da0baa93c5", "title": "CSP \u9055\u53cd\u30ec\u30dd\u30fc\u30c8\u306e\u5229\u7528\u65b9\u6cd5", "url": "/ja/docs/Web/Security/CSP/Using_CSP_violation_reports", "tags": ["Security", "Content Security Policy"], "summary": "Web \u30b5\u30a4\u30c8\u306e\u7ba1\u7406\u8005\u306e\u305f\u3081\u306e Content Security Policy \u306e\u5f37\u529b\u306a\u6a5f\u80fd\u306e\u4e00\u3064\u306f\u3001\u3042\u306a\u305f\u306e\u30b5\u30a4\u30c8\u3078\u306e\u653b\u6483\u3092\u8a18\u9332\u3057\u305f\u30ec\u30dd\u30fc\u30c8\u3092\u751f\u6210\u3057\u3001\u5c4a\u3051\u308b\u6a5f\u80fd\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u3066\u3044\u308b\u3053\u3068\u3067\u3059\u3002\u3053\u308c\u3089\u306e\u30ec\u30dd\u30fc\u30c8\u306f\u3001HTTP POST \u8981\u6c42\u306b\u3088\u308a\u3001report-uri
\u30dd\u30ea\u30b7\u30fc\u30c7\u30a3\u30ec\u30af\u30c6\u30a3\u30d6\u3067\u6307\u5b9a\u3057\u305f\u8907\u6570\u306e\u30b5\u30fc\u30d0\u3078\u5c4a\u3051\u3089\u308c\u307e\u3059\u3002\u30ec\u30dd\u30fc\u30c8\u306f JSON \u5f62\u5f0f\u3067\u3059\u3002\u3053\u306e\u8a18\u4e8b\u306f\u3001\u30ec\u30dd\u30fc\u30c8\u6a5f\u80fd\u3092\u4f7f\u7528\u3059\u308b\u3088\u3046\u306b\u30b5\u30a4\u30c8\u3092\u8a2d\u5b9a\u3059\u308b\u65b9\u6cd5\u3068\u3001\u30ec\u30dd\u30fc\u30c8\u306e\u5f62\u5f0f\u3092\u7d39\u4ecb\u3057\u307e\u3059\u3002", "localization_tags": [], "locale": "ja", "last_edit": "2016-02-13T02:04:18", "review_tags": []}, {"uuid": "c2ab7f06-fe28-490c-a6a9-16a69e9fc7f3", "title": "Using CSP violation reports", "url": "/zh-CN/docs/Web/Security/CSP/Using_CSP_violation_reports", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "zh-CN", "last_edit": "2015-04-24T20:22:51", "review_tags": []}], "modified": "2016-08-05T02:40:45", "label": "Using CSP violation reports", "localization_tags": [], "locale": "en-US", "id": 279, "last_edit": "2016-08-05T02:40:43", "summary": "One powerful feature of Content Security Policy for web site administrators is the support it offers for generating and delivering reports describing attempts to attack your site. These reports are delivered by HTTP\u00a0POST requests to one or more servers you specify using the report-uri
policy directive. The reports are in JSON\u00a0format, using the default JSON UTF-8 encoding for non-ASCII characters. This article shows you how to configure your site to use the reporting feature, as well as the format of the reports.", "sections": [{"id": "Enabling_reporting", "title": "Enabling reporting"}, {"id": "Violation_report_syntax", "title": "Violation report syntax"}, {"id": "Sample_violation_report", "title": "Sample violation report"}, {"id": "See_also", "title": "See also"}], "slug": "Web/Security/CSP/Using_CSP_violation_reports", "review_tags": []}