The parseHTMLUnsafe()
static method can be used to create a new Document
instance, optionally filter out unwanted elements and attributes. The resulting Document
will have a content type of "text/html", a character set of UTF-8, and a URL of "about:blank".
The suffix "Unsafe" in the method name indicates that, while the method does allow the input string to be filtered of unwanted HTML entities, it does not enforce the sanitization or removal of potentially unsafe XSS-relevant input. If no sanitizer configuration is specified in the options.sanitizer
parameter, parseHTMLUnsafe()
is used without any sanitization. Note that <script>
elements are not evaluated during parsing.
The input HTML may include declarative shadow roots. If the string of HTML defines more than one declarative shadow root in a particular shadow host then only the first ShadowRoot
is created â subsequent declarations are parsed as <template>
elements within that shadow root.
parseHTMLUnsafe()
should be instead of Document.parseHTML()
when parsing potentially unsafe strings of HTML that for whatever reason need to contain XSS-unsafe elements or attributes. If the HTML to be parsed doesn't need to contain unsafe HTML entities, then you should use Document.parseHTML()
.
Note that since this method does not necessarily sanitize input strings of XSS-unsafe entities, input strings should also be validated using the Trusted Types API. If the method is used with both a trusted types and a sanitizer, the HTML input will be passed through the trusted type transformation function before it is sanitized.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4