diff --git a/README.md b/README.md
index f8539a8c..008da171 100644
--- a/README.md
+++ b/README.md
@@ -117,6 +117,7 @@ There's also a JavaScript API, taglib and a collection of plugins to make your j
- [Complete Configuration](#complete-configuration)
- [Node.js-style Module Support](#nodejs-style-module-support)
- [No Conflict Builds](#no-conflict-builds)
+- [Content Security Policy Support](#content-security-policy-support)
- [Available Plugins](#available-plugins)
- [Extending Lasso.js](#extending-lassojs)
- [Custom Plugins](#custom-plugins)
@@ -161,7 +162,6 @@ There's also a JavaScript API, taglib and a collection of plugins to make your j
* Optional Base64 image encoding inside CSS files
* Custom output transforms
* Declarative browser-side package dependencies using simple `browser.json` files
- * Generates the HTML markup required to include bundled resources
* Conditional dependencies
* Image minification
* etc.
@@ -174,6 +174,7 @@ There's also a JavaScript API, taglib and a collection of plugins to make your j
* Full support for [browserify](http://browserify.org/) shims and transforms
* Maintains line numbers in wrapped code
* Developer Friendly
+ * Generates the HTML markup required to include bundled resources
* Disable bundling and minification in development
* Line numbers are maintained for Node.js modules source
* Extremely fast _incremental builds_!
@@ -199,6 +200,8 @@ There's also a JavaScript API, taglib and a collection of plugins to make your j
* Integrate with build tools
* Use with Express or any other web development framework
* JavaScript API, CLI and taglib
+* Security
+ * Supports the [nonce attribute](https://www.w3.org/TR/CSP2/#script-src-the-nonce-attribute) when using Content Security Policy for extra security.
* _Future_
* Automatic image sprites
@@ -1359,6 +1362,79 @@ require('lasso').create({
See [Configuration](#configuration) for full list of configuration options.
+# Content Security Policy Support
+
+Newer browsers support a web standard called Content Security Policy that prevents, among other things, cross-site scripting attacks by whitelisting inline `
+
+
+