Performance and security
Use this guide to keep Messenger fast, stable, and secure in production environments.
What it is
This page covers:
- Lazy loading controls
- Live chat loader mode
- Secure identity verification
- CSP policy baselines
Where to find it in OXVO
- Settings → Inboxes → [Your inbox] → Installation for runtime config values
- Settings → Security for workspace-level access controls
When to use it
Use this guide before production release and during security/performance reviews.
Lazy loading options
The SDK supports lazy settings:
lazy: {
enabled: true,
loadOnIdle: true,
idleMs: 5000,
disableOnSlowConnection: true,
}
Behavior summary:
enabled: turns lazy mode onloadOnIdle: schedules load during idle timeidleMs: fallback timeout windowdisableOnSlowConnection: skips lazy preloading on slow/data-save network profiles
Live chat loader mode
liveChatLoader: {
enabled: true,
appearance: {
position: 'right',
theme: 'auto',
type: 'expanded_bubble',
launcherTitle: 'Support',
horizontalSpacing: 24,
verticalSpacing: 24,
messengerColor: '#2d6bff',
},
}
Operational notes:
liveChatLoaderis off by default.- Enabling it also forces lazy mode on.
- Appearance precedence is:
- default values
- Messenger
settings liveChatLoaderroot valuesliveChatLoader.appearancevalues
widgetStyleis inherited from Messenger settings and is not overridden byliveChatLoader.appearance.
Secure identity verification
For authenticated users:
- Build
identifier_hashon your backend. - Pass it in
identifypayload. - Rotate signing secrets using your internal security policy.
Warning: Never generate identifier hashes in browser/mobile client code.
Content Security Policy baseline
Use this as a starting template and adapt to your policy model:
Content-Security-Policy:
default-src 'self';
script-src 'self' https://YOUR_OXVO_DOMAIN;
connect-src 'self' https://YOUR_OXVO_DOMAIN wss://YOUR_OXVO_DOMAIN;
frame-src https://YOUR_OXVO_DOMAIN;
img-src 'self' data: https://YOUR_OXVO_DOMAIN;
style-src 'self' 'unsafe-inline';
Implementation notes:
script-srcmust allow OXVO SDK script host.frame-srcmust allow Messenger iframe host.connect-srcshould allow HTTPS and WebSocket traffic to your OXVO domain.- Tighten directives further if your environment requires nonces/hashes.
Production checklist
- Run load tests with loader mode off and on.
- Confirm first interaction latency under your target threshold.
- Validate identity hash behavior with both valid and invalid test signatures.
- Verify CSP in browser report-only mode before enforcement.
- Capture and monitor
oxvo:errorevents.
Related guides
- Install the Messenger SDK
- Visitor identification and properties
- Listeners and events
- Methods reference
📷 Image (optional): Production hardening for Messenger SDK
Why: Gives teams a single visual checklist for lazy loading, identity verification, and CSP enforcement before launch.
File:docs/images/sdk-performance-security-checklist.png
AI prompt: "Clean SaaS documentation checklist screen for OXVO Messenger SDK production hardening with sections Lazy Loading, Live Chat Loader, Identifier Hash, CSP, and Monitoring; modern neutral UI, crisp typography, OXVO branding only, 1600x1000."