Skip to content

Conversation

garland3
Copy link

Summary

  • escape literal </script> sequences in generated inline JavaScript to block injection
  • add a unittest-based test suite with coverage for the escaping behavior
  • hook the new tests into CI via the existing GitHub Actions workflow

Testing

  • ./tests/run_tests.sh

- Escape </script> sequences in generated JavaScript to prevent injection.
- Add unit test suite with test for script escaping.
- Integrate unit tests into CI/CD workflow.

Addresses security issue where user-controlled data could inject arbitrary script.
…s#219)

- Only allow http, https, mailto, ftp, or relative URLs in require.hyperlink
- Add unit tests for safe and unsafe schemes

Addresses security issue where javascript: and data: URIs could be used for injection.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant