diff --git a/index.bs b/index.bs
index ca53380..c1354cc 100644
--- a/index.bs
+++ b/index.bs
@@ -54,6 +54,11 @@ text: report a warning to the console; type: dfn; url: https://console.spec.what
"href": "https://www.bucksch.org/1/projects/mozilla/108153/",
"title": "HTML Sanitizer",
"publisher": "Ben Bucksch"
+ },
+ "XSS": {
+ "href": "https://developer.mozilla.org/de/docs/Web/Security/Attacks/XSS",
+ "title": "Cross-Site Scripting",
+ "publisher": "MDN Web Docs"
}
}
@@ -1452,11 +1457,17 @@ URLs, is as follows:
# Security Considerations # {#security-considerations}
-The Sanitizer API is intended to prevent DOM-based Cross-Site Scripting
-by traversing a supplied HTML content and removing elements and attributes
-according to a configuration. The specified API must not support
-the construction of a Sanitizer object that leaves script-capable markup in
-and doing so would be a bug in the threat model.
+The Sanitizer API is intended to prevent DOM-based Cross-Site Scripting [[XSS]]
+by traversing supplied HTML content and removing elements and attributes
+according to a configuration. The Sanitizer API ships a strict baseline,
+such that scripting can never be allowed (cf. [[#never-allowed]]).
+In addition to this, a default safe list includes further restrictions that may help
+prevent a wide range of undesirable effects. These include, elements that can override
+site-specific settings (e.g., ``), embed third-party content, or change the
+layout/semantics of the page (e.g., `
`, `