diff --git a/index.bs b/index.bs index ca53380..c1354cc 100644 --- a/index.bs +++ b/index.bs @@ -54,6 +54,11 @@ text: report a warning to the console; type: dfn; url: https://console.spec.what "href": "https://www.bucksch.org/1/projects/mozilla/108153/", "title": "HTML Sanitizer", "publisher": "Ben Bucksch" + }, + "XSS": { + "href": "https://developer.mozilla.org/de/docs/Web/Security/Attacks/XSS", + "title": "Cross-Site Scripting", + "publisher": "MDN Web Docs" } } @@ -1452,11 +1457,17 @@ URLs, is as follows: # Security Considerations # {#security-considerations} -The Sanitizer API is intended to prevent DOM-based Cross-Site Scripting -by traversing a supplied HTML content and removing elements and attributes -according to a configuration. The specified API must not support -the construction of a Sanitizer object that leaves script-capable markup in -and doing so would be a bug in the threat model. +The Sanitizer API is intended to prevent DOM-based Cross-Site Scripting [[XSS]] +by traversing supplied HTML content and removing elements and attributes +according to a configuration. The Sanitizer API ships a strict baseline, +such that scripting can never be allowed (cf. [[#never-allowed]]). +In addition to this, a default safe list includes further restrictions that may help +prevent a wide range of undesirable effects. These include, elements that can override +site-specific settings (e.g., ``), embed third-party content, or change the +layout/semantics of the page (e.g., ``, `