Skip to content

Client-Side Defense Capabilities

F5 Distributed Cloud Client-Side Defense (CSD) protects web applications from client-side attacks by monitoring JavaScript behavior directly in the browser. The F5 XC load balancer can be configured to inject the CSD telemetry script into pages served to the client. This script observes all JavaScript activity — which scripts load, which form fields they read, and which network connections they make. Telemetry data is sent to the F5 XC platform where machine learning models analyze script behavior, assign risk scores, and flag anomalies. Security teams review detections in the CSD console and take action by allowing or mitigating script domains.

flowchart LR
    A["Browser JS"] --> B["CSD Telemetry Script"]
    B --> C["F5 XC Platform"]
    C --> D["ML Analysis"]
    D --> E["CSD Dashboard"]

CSD monitors three categories of browser-side behavior:

SignalWhat CSD ObservesExample
Form field readsWhich scripts access which input fields present in the page DOM at load timemain.js reading the password field on /login
Script inventoryAll first-party and third-party JavaScript loaded on each page, tracked by source domainA new <script> tag loading from cdn.jsdelivr.net appearing on the login page
Network interactionsDomains involved in script network activity — includes both script-load source domains and fetch/XHR destination domainsScripts sourced from esm.sh and data exfiltration targets like www.httpbin.org appearing in detected domains
FeatureDescriptionConsole Location
Script risk scoringAutomatic classification: No Risk, Low Risk, High RiskScript List → Risk Level column
Form field sensitivityAuto-classifies fields as Sensitive (by system) based on field type and nameForm Fields view → Analysis column
Behavior timelineCharts script risk level, source domain, and type over timeScript detail → Overview → Behaviors Over Time
Affected user attributionTracks impacted users by IP, geolocation, browser, and deviceScript detail → Affected Users tab
Domain allow listMark trusted script domains as allowedDashboard → domain row → Add To Allow List
Domain mitigate listBlock network calls and form field reads from specific script domains, preventing data exfiltrationDashboard → domain row → Add To Mitigate List
Alert configurationNotifications for new domains, risk changes, suspicious behaviorNotifications section
Script justificationAdd notes explaining why a script is authorized (PCI DSS compliance)Script detail → Justification field
Transaction trackingMonthly telemetry event counter confirming CSD is activeDashboard → Transactions Consumed card
Time and location filtersFilter all views by time range (24h, 7d, 30d) and locationTop bar filter controls

Understanding what CSD does not monitor is critical for setting accurate demo expectations:

LimitationDetailVerified
Dynamically created fieldsCSD tracks input fields present in the DOM at page load. Fields injected by JavaScript after load are not monitored. A dynamically created <input> read by a script does not appear in the Form Fields view.Yes — field absent from /formFields after 10-minute wait
Code-level obfuscationCSD does not flag dynamic code execution techniques or obfuscation patterns as separate detection signals. Obfuscated harvesters produce the same risk level as non-obfuscated ones — CSD tracks behavioral metadata, not source code patterns.Yes — identical “High Risk” for both techniques
Form overlay fieldsCSD tracks only form fields present in the original DOM at page load. Overlay forms injected by JavaScript (a common digital skimming technique) are not tracked — only reads of the original fields are detected.Yes — overlay fields absent from /formFields after 10-minute wait
Dashboard counter behaviorThe “Found & Mitigated” and “Found & Allowed” summary counts only change after an admin explicitly adds a domain to the mitigate or allow list. The “Action Needed” and “Total Found” counts update automatically when new domains are detected.Yes — “Found & Allowed” changed from 0 to 1 only after POST to /allowed_domains

CSD directly addresses two PCI DSS v4.0 requirements for payment page security:

PCI DSS RequirementWhat It RequiresHow CSD Addresses It
6.4.3 — Script management on payment pagesMaintain an inventory of all scripts, provide written authorization and justification for each, verify script integrityScript List provides full inventory; Justification field documents authorization; behavior timeline tracks changes
11.6.1 — Tamper detection on payment pagesDetect unauthorized modifications to HTTP headers and payment page contentCSD telemetry detects new script injections, unauthorized form field reads, and new network domains — alerting on changes to page behavior

The following table maps common client-side attack categories to the CSD detection signals that would fire during each attack type. Attack types marked with * are confirmed by F5 official documentation. Unmarked types are inferred based on CSD’s detection signal categories and may not be explicitly claimed by F5.

Attack CategoryDescriptionField ReadsScript InjectionNetwork
Formjacking *Malicious script reads form field values and exfiltrates themYesYes
Digital skimming *Injects overlay forms or scripts to capture payment dataYesYesYes
Supply chain attack *Compromised third-party library loads malicious codeYesYes
Data exfiltration *Reads sensitive data and sends it to external domainsYesYes
Script injection *Inserts unauthorized <script> tags into the pageYesYes
Cryptojacking *Injects cryptocurrency mining scriptsYesYes
DOM manipulationInjects or modifies page elements to deceive usersYes
Man-in-the-BrowserIntercepts form data within the browser session — see OWASP and MITRE T1185YesYes
ClickjackingOverlays invisible frames to hijack user clicks — see OWASPYes
Web skimmer persistenceRe-injects skimmer scripts across page navigations — see Sansec Magecart ResearchYesYes