Skip to content

XSS Prevention #2

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
danny-avila opened this issue Jun 27, 2024 · 2 comments
Open

XSS Prevention #2

danny-avila opened this issue Jun 27, 2024 · 2 comments

Comments

@danny-avila
Copy link

Hi @ozgrozer 👋

Great job on this. I've been working on something similar but found the choice to use iframe not very sensitive to security.

Any thoughts on how the current code could mitigate XSS?

image

@danny-avila
Copy link
Author

In a more "nefarious" example, and just through prompting, I can "override" the entire app

image

@ozgrozer
Copy link
Owner

Try this commit. It should prevent XSS.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants