Avoid manual sanitization of inputs Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter .
TRY THIS RULE ID: javascript-browser-security/manual-sanitization
Language: JavaScript
Severity: Warning
Category: Security
Description Never sanitize HTML input manually. It can lead to vulnerabilities. Use dedicated modules such as sanitize-html
to sanitize user inputs.
Non-Compliant Code Examples const sanitizedInput = input
. replaceAll ( '<' , '<' )
. replaceAll ( '>' , '>' );
const html = `<strong> ${ sanitizedInput } </strong>` ;
const sanitizedInput2 = input
. replaceAll ( 'bla' , '<' )
. replaceAll ( 'foo' , '>' );
const sanitizedInput3 = input
. replaceAll ( '<' , '<' )
. replaceAll ( '>' , 'gt;' );
Compliant Code Examples import sanitizeHtml from 'sanitize-html' ;
const html = sanitizeHtml ( `<strong> ${ input } </strong>` );
Seamless integrations. Try Datadog Code Analysis