You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This rule errors or warns developers of the use of v-html and its potential to lead to XSS attacks.
What category of rule is this? (place an "X" next to just one item)
[ ] Enforces code style
[ ] Warns about a potential error
[ ] Suggests an alternate way of doing something
[X] Other (please specify:) Security enhancement
Provide 2-3 code examples that this rule will warn about:
Why should this rule be included?
Injecting unescaped html into the view can be unsafe depending on the source of the html. If it ties into user input it has the potential for XSS attacks. This rule should be able to set as warning and optional as this directive might be needed for trusted HTML coming from the server side.
Please describe what the rule should do:
This rule errors or warns developers of the use of v-html and its potential to lead to XSS attacks.
What category of rule is this? (place an "X" next to just one item)
[ ] Enforces code style
[ ] Warns about a potential error
[ ] Suggests an alternate way of doing something
[X] Other (please specify:) Security enhancement
Provide 2-3 code examples that this rule will warn about:
Why should this rule be included?
Injecting unescaped html into the view can be unsafe depending on the source of the html. If it ties into user input it has the potential for XSS attacks. This rule should be able to set as warning and optional as this directive might be needed for trusted HTML coming from the server side.
Similar implementation in react eslint ruleset.
The text was updated successfully, but these errors were encountered: