This page is not complete.
The HTML Sanitizer API allow developers to take untrusted strings of HTML, and sanitize them for safe insertion into a document’s DOM.
Web applications often need to work with strings of HTML on the client side, perhaps as part of a client-side templating solution, perhaps as part of rendering user generated content. It is difficult to do so in a safe way. The Sanitizer API allows for rendering HTML in a safe manner.
To access the API you would use the constructor, which creates a
Sanitizer.Sanitizer instance and allows for a configurable list of allowed or dis-allowed elements and attributes.
The most common use-case - preventing XSS - is handled by the built-in default lists, so that creating a
Sanitizer.Sanitizer with a custom config is necessary only to handle additional, application-specific use cases.
The API has two methods to sanitize strings. One returns a string and the other returns a document fragment. See the examples section below for more.
// our input string to clean const stringToClean = 'Some text <b><i>with</i></b> <blink>tags</blink>, including a rogue script <script>alert(1)</script> def.'; const result = new Sanitizer().sanitizeToString(stringToClean); console.log(result); // Logs: "Some text <b><i>with</i></b> <blink>tags</blink>, including a rogue script def."
// our input string to clean const stringToClean = 'Some text <b><i>with</i></b> <blink>tags</blink>, including a rogue script <script>alert(1)</script> def.'; const result = new Sanitizer().sanitize(stringToClean); // Result: A DocumentFragment containing text nodes and a <b> element, with a <i> child element
|HTML Sanitizer API
The definition of 'sanitizeToString' in that specification.
|Working Draft||Initial definition.|
BCD tables only load in the browser