Compatibility Setup
How to configure your app's security policies so Checkpoint can embed it, run the agent, and map comment anchors accurately.
Why this happens
Checkpoint comments rely on three things:
- The app can be embedded in the Checkpoint share frame.
- The Checkpoint agent can run in the embedded page.
- The DOM is stable enough to re-find comment anchors.
If any of these fail, comments still work, but precise pin and code mapping may degrade.
Quick status meanings
| Status | Meaning |
|---|---|
| Agent connected | Checkpoint agent loaded and messaging is active |
| Framing blocked | Your app prevents iframe embedding via frame-ancestors or X-Frame-Options |
| CSP blocked | Content Security Policy blocks agent execution |
| Anchor fallback mode | Mapping uses coordinate/text fallback rather than strong anchors |
Required policy changes
1. Allow embedding from Checkpoint
Add https://app.checkpoint.build to your CSP frame-ancestors directive.
2. Avoid restrictive frame headers on review pages
Do not use X-Frame-Options: DENY or strict SAMEORIGIN for routes reviewed in Checkpoint.
3. Keep script policy compatible
Your CSP must allow scripts needed by your app and Checkpoint review instrumentation.
Copy-paste snippets
Next.js
Express
Nginx
Best reliability for exact mapping
Add explicit anchors to important UI elements using the data-checkpoint-anchor attribute:
Use stable IDs and keys for repeated list items when possible.
Security recommendation
Apply relaxed policies on review and staging routes when possible, rather than globally across all production pages.
Troubleshooting checklist
- Confirm the page loads inside the Checkpoint share frame.
- Check the browser console for CSP or frame violations.
- Verify
frame-ancestorsincludeshttps://app.checkpoint.build. - Remove or reduce restrictive
X-Frame-Optionsfor review routes. - Add
data-checkpoint-anchorattributes to critical interaction points.