From d27be83de8083c3e484dad03c52d001375a8d95c Mon Sep 17 00:00:00 2001 From: vhs <97140109+vhscom@users.noreply.github.com> Date: Sun, 29 May 2022 13:20:40 +0800 Subject: [PATCH] docs: add js-xss to sanitizer warning (#2484) close: #2482 --- docs/INDEX.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/INDEX.md b/docs/INDEX.md index d583cdf21a..a9b3af95d8 100644 --- a/docs/INDEX.md +++ b/docs/INDEX.md @@ -25,7 +25,7 @@ These documentation pages are also rendered using marked 💯

Usage

-### Warning: 🚨 Marked does not [sanitize](/using_advanced#options) the output HTML. Please use a sanitize library, like [DOMPurify](https://github.com/cure53/DOMPurify) (recommended), [sanitize-html](https://github.com/apostrophecms/sanitize-html) or [insane](https://github.com/bevacqua/insane) on the *output* HTML! 🚨 +### Warning: 🚨 Marked does not [sanitize](/using_advanced#options) the output HTML. If you are processing potentially unsafe strings, it's important to filter for possible XSS attacks. Some filtering options include [DOMPurify](https://github.com/cure53/DOMPurify) (recommended), [js-xss](https://github.com/leizongmin/js-xss), [sanitize-html](https://github.com/apostrophecms/sanitize-html) and [insane](https://github.com/bevacqua/insane) on the *output* HTML! 🚨 ``` DOMPurify.sanitize(marked.parse(``));