html_sanitize_ex
provides a fast and straightforward HTML Sanitizer written in Elixir which lets you include HTML authored by third-parties in your web application while protecting against XSS.
It is the first Hex package to come out of the elixirstatus.com project, where it will be used to sanitize user announcements from the Elixir community.
html_sanitize_ex
parses a given HTML string and, based on the used Scrubber, either completely strips it from HTML tags or sanitizes it by only allowing certain HTML elements and attributes to be present.
NOTE: The one thing missing at this moment is support for styles. To add this, we have to implement a Scrubber for CSS, to prevent nasty CSS hacks using <style>
tags and attributes.
Otherwise html_sanitize_ex
is a full-featured HTML sanitizer.
Add html_sanitize_ex as a dependency in your mix.exs
file.
defp deps do
[{:html_sanitize_ex, "~> 1.3.0-rc3"}]
end
After adding you are done, run mix deps.get
in your shell to fetch the new dependency.
The only dependency of html_sanitize_ex
is mochiweb
which is used to parse HTML.
It can strip all tags from the given string:
text = "<a href=\"javascript:alert('XSS');\">text here</a>"
HtmlSanitizeEx.strip_tags(text)
# => "text here"
Or allow certain basic HTML elements to remain:
text = "<h1>Hello <script>World!</script></h1>"
HtmlSanitizeEx.basic_html(text)
# => "<h1>Hello World!</h1>"
The following scrubbing options exist:
HtmlSanitizeEx.noscrub(html)
HtmlSanitizeEx.basic_html(html)
HtmlSanitizeEx.html5(html)
HtmlSanitizeEx.markdown_html(html)
HtmlSanitizeEx.strip_tags(html)
TODO: write more comprehensive usage description
- Fork it!
- Create your feature branch (
git checkout -b my-new-feature
) - Commit your changes (
git commit -am 'Add some feature'
) - Push to the branch (
git push origin my-new-feature
) - Create new Pull Request
René Föhring (@rrrene)
html_sanitize_ex is released under the MIT License. See the LICENSE file for further details.