FrontMCP applies security headers to every HTTP response, including Content Security Policy (CSP), Strict-Transport-Security (HSTS), X-Frame-Options, and X-Content-Type-Options. Configure them viaDocumentation Index
Fetch the complete documentation index at: https://docs.agentfront.dev/llms.txt
Use this file to discover all available pages before exploring further.
frontmcp.config server settings --- they are injected as environment variables at build time and read by the built-in middleware.
Quick Start
Add security headers tofrontmcp.config.ts:
CSP Configuration
| Field | Type | Default | Description |
|---|---|---|---|
enabled | boolean | false | Enable CSP headers |
directives | string | --- | Semicolon-separated CSP directives |
reportUri | string | --- | URI for CSP violation reports |
reportOnly | boolean | false | Use Content-Security-Policy-Report-Only instead of enforcement |
Example Directives
Security Headers
| Header | Config Field | Default | Description |
|---|---|---|---|
Strict-Transport-Security | headers.hsts | --- | HSTS policy for HTTPS enforcement |
X-Content-Type-Options | headers.contentTypeOptions | nosniff | Prevent MIME type sniffing |
X-Frame-Options | headers.frameOptions | DENY | Clickjacking protection |
| Custom headers | headers.custom | --- | Record of additional header name-value pairs |
X-Content-Type-Options: nosniff and X-Frame-Options: DENY are applied by default even without explicit configuration. Set them to empty strings to disable.Environment Variables
All settings are injected as environment variables at build time by the deployment adapter:| Variable | Maps To |
|---|---|
FRONTMCP_CSP_ENABLED | server.csp.enabled |
FRONTMCP_CSP_DIRECTIVES | server.csp.directives |
FRONTMCP_CSP_REPORT_URI | server.csp.reportUri |
FRONTMCP_CSP_REPORT_ONLY | server.csp.reportOnly |
FRONTMCP_HSTS | server.headers.hsts |
FRONTMCP_CONTENT_TYPE_OPTIONS | server.headers.contentTypeOptions |
FRONTMCP_FRAME_OPTIONS | server.headers.frameOptions |
Programmatic Access
For custom middleware or adapters, use the security header functions directly:Report-Only Mode
UsereportOnly: true to test CSP rules without blocking content:
Content-Security-Policy-Report-Only header instead of Content-Security-Policy, allowing you to monitor violations before enforcing the policy.
Related
Configuration File
Full configuration reference
Production Build
Build and deploy for production