You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Dec 14, 2018. It is now read-only.
We've been recommending the safe approach for a couple of years, which is you put the data inside a DIV tag, in a data attribute, at which point @ and HTML encoding works just fine.
There are cases where simply Javascript encoding introduces XSS (for example, outputting into an OnX attribute on an element). The existence of this method encourages folks to do the wrong thing.
The text was updated successfully, but these errors were encountered:
@blowdart Can you please give me a link to an article showing how can it be exploited?
Having to write the text in html and use javascript to read it is very awkward 😢
Will it ever be safe or just forget about its existence?
This @ method is unsafe. It needs to be removed.
We've been recommending the safe approach for a couple of years, which is you put the data inside a DIV tag, in a data attribute, at which point @ and HTML encoding works just fine.
There are cases where simply Javascript encoding introduces XSS (for example, outputting into an OnX attribute on an element). The existence of this method encourages folks to do the wrong thing.
The text was updated successfully, but these errors were encountered: