X-Git-Url: http://git.vanrenterghem.biz/git.ikiwiki.info.git/blobdiff_plain/b24394c0ecf954f2fc0ee2e156d19cd6382f8b70..376944cb026945ab597db01eb1e3aea4fa320007:/doc/plugins/htmlscrubber.mdwn diff --git a/doc/plugins/htmlscrubber.mdwn b/doc/plugins/htmlscrubber.mdwn index 1255d7723..d7bcf8099 100644 --- a/doc/plugins/htmlscrubber.mdwn +++ b/doc/plugins/htmlscrubber.mdwn @@ -7,7 +7,7 @@ to avoid XSS attacks and the like. It excludes all html tags and attributes except for those that are whitelisted using the same lists as used by Mark Pilgrim's Universal Feed Parser, documented at . -Notably it strips `style`, `link`, and the `style` attribute. +Notably it strips `style` and `link` tags, and the `style` attribute. It uses the [[cpan HTML::Scrubber]] perl module to perform its html sanitisation, and this perl module also deals with various entity encoding @@ -17,7 +17,7 @@ While I believe that this makes ikiwiki as resistant to malicious html content as anything else on the web, I cannot guarantee that it will actually protect every user of every browser from every browser security hole, badly designed feature, etc. I can provide NO WARRANTY, like it says -in ikiwiki's [GPL](GPL) license. +in ikiwiki's [[GPL]] license. The web's security model is *fundamentally broken*; ikiwiki's html sanitisation is only a patch on the underlying gaping hole that is your web @@ -32,6 +32,8 @@ HTML tags. Some examples of embedded javascript that won't be let through when this plugin is active: -* test -* test -* test +* script tag test +* CSS script test +* entity-encoded CSS script test +* entity-encoded CSS script test +* click me