-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CSInterface.js DOM text reinterpreted as HTML #212
base: main
Are you sure you want to change the base?
Conversation
Hi @adamplouff Could You Please Review this PR |
Hi @adamplouff Could You Please Review this PR |
3 similar comments
Hi @adamplouff Could You Please Review this PR |
Hi @adamplouff Could You Please Review this PR |
Hi @adamplouff Could You Please Review this PR |
Hi @adamplouff Is there Anything Else is Required From My Side |
Hi @adamplouff Could You Please Review this PR |
1 similar comment
Hi @adamplouff Could You Please Review this PR |
I have been using this tool for a little bit and, since I am starting to get into open source, want to make some potential contributions myself but is no one checking any of the pull requests? I really hope this tool isn't abandoned given its usefulness. |
Use overlord 2
…On Mon, Aug 26, 2024 at 10:37 PM Matt Scullino ***@***.***> wrote:
I have been using this tool for a little bit and, since I am starting to
get into open source, want to make some potential contributions myself but
is no one checking any of the pull requests? I really hope this tool isn't
abandoned given its usefulness.
—
Reply to this email directly, view it on GitHub
<#212 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AALNXMZHUXL2KVHLQGGF6WTZTQGBXAVCNFSM6AAAAABGGA77EKVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGMJRGYYTCMBZHA>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
|
By using innerText, it will avoid the risk of HTML injection, as these properties automatically escape any HTML special characters in the provided text. This helps prevent cross-site scripting (XSS) vulnerabilities by treating the input as plain text rather than interpreted HTML. Always be cautious when dealing with user input or dynamic content to prevent security risks.