You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi folks, this package disallowsdata: URIs wholesale, which can be susceptible to the XSS exploit. However, there are cases where it's still a useful standard. Over in https://github.com/plotly/dash, we're using this project to sanitize URIs to protect against XSS, but some users have brought up that blanket prevention of data: can be overly restrictive (plotly/dash#2764).
This may not be an issue with this package per se, but the question is whether it is a reasonable approach to blanket disallow data: or whether there is a more fine-grained sanitation scheme that might allow certain kinds of valid data: URLs; maybe this is something maintainers of this package have thought about. Thanks!
The text was updated successfully, but these errors were encountered:
Hi folks, this package disallows
data:
URIs wholesale, which can be susceptible to the XSS exploit. However, there are cases where it's still a useful standard. Over in https://github.com/plotly/dash, we're using this project to sanitize URIs to protect against XSS, but some users have brought up that blanket prevention ofdata:
can be overly restrictive (plotly/dash#2764).This may not be an issue with this package per se, but the question is whether it is a reasonable approach to blanket disallow
data:
or whether there is a more fine-grained sanitation scheme that might allow certain kinds of validdata:
URLs; maybe this is something maintainers of this package have thought about. Thanks!The text was updated successfully, but these errors were encountered: