(no title)
zawerf
|
6 years ago
I am always irrationally(?) scared of using these sanitizers despite their successful history. As soon as new html/js/css syntax/features are introduced, won't your security model need to be reevaluated? Which seems like a lost cause at the rate new capabilities are introduced to the web. E.g., when CSS Shaders lands, you might be able to execute arbitrary gpu code with just css (hypothetically speaking, I don't actually know how it will work. I am sure it'll be sandboxed pretty well. But the problem remains that there are too many new possibilities to keep up with!).
_urga|6 years ago
I would be more concerned of using server-side sanitizers due to the impedance mismatch between client/server HTML parsing algorithms.
dogma1138|6 years ago
What you said can be generically applied to every security control and which is why security is hard.
nullandvoid|6 years ago
You're still catching entire classes of existing issues..
hannob|6 years ago
You're very close to understanding something.
(Though in defense of DOM purifiers they can use a whitelist)
zAy0LfpBZLC8mAC|6 years ago
__s|6 years ago
Windows Defender is sufficient & bundled with Windows
megous|6 years ago
zawerf|6 years ago