- How is it possible to get XSS attacks on <style> tag when display user provided html content ? https://github.com/apostrophecms/sanitize-html#discarding-the-entire-contents-of-a-disallowed-tag 4 comments frontend
Linking pages
- GitHub - goniszewski/grimoire: Bookmark manager for the wizards 🧙 https://github.com/goniszewski/grimoire 119 comments
- Wrap your dependencies https://thoughtbot.com/blog/wrap-your-dependencies 51 comments
- GitHub - markedjs/marked: A markdown parser and compiler. Built for speed. https://github.com/chjj/marked 7 comments
- GitHub - sorrycc/awesome-javascript: 🐢 A collection of awesome browser-side JavaScript libraries, resources and shiny things. https://github.com/sorrycc/awesome-javascript 4 comments
- Vue Security Best Practices 💎 https://dev-academy.com/vue-security-best-practices/ 2 comments
- sanitize-html - npm https://npmjs.org/package/sanitize-html 0 comments
- DOM based XSS Prevention - OWASP Cheat Sheet Series https://www.owasp.org/index.php/DOM_based_XSS_Prevention_Cheat_Sheet 0 comments
- How To Parse and Render Markdown In Vuejs https://blog.openreplay.com/how-to-parse-and-render-markdown-in-vuejs 0 comments
- How We Built Quack (Beta) — Good Enough https://goodenough.us/blog/2023-06-29-how-we-built-quack-beta/ 0 comments