I may be going over old ground, but don't the CSP violations reports ( see <a href="https://developer.mozilla.org/en/Security/CSP/Using_CSP_violation_reports" rel="nofollow">https://developer.mozilla.org/en/Security/CSP/Using_CSP_viol...</a> ) open up another attack vector?<p>I know people who actually implement this are going to have their heads screwed on around the right way, but having a page where you know you can generate server processing, and that is potentially not going to have much security around it screams out to me to be a good place to start an attack from.<p>Especially as the spec is a bit vague about exactly what happens when (no head specified for example, doesn't say about including cookies or any other information). Also, fiesta.cc's CSP Report URI returns a response that says to keep the connection open.<p>And, if you manage to get a script injected to a popular page, the site itself acts as a distribution system to enable distribution to multiple users.<p>Something about this says it's not been thoroughly thought through to me.