I'm reading about the OWASP double submit cookies method of protection and there it states that the cookie value between the header and form should match.
That seems to be somewhat of a risk, as the article states, as the value embedded in the form can be accessed by the DOM & Javascript.
Would it not be more secure to have a differently seeded value for the cookie and the HTTP POST embedded value, so that a malicious script can't infer the cookie value
ASP.NET's AntiForgeryToken is an example of a double submit cookie. Its unclear to me if that token uses the same value for the cookie as the form.