Skip to content

Commit 516bc8b

Browse files
committed
use bullet lists
1 parent 786e7fd commit 516bc8b

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

src/routes/solid-start/guides/security.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,13 @@ However, this protection does not apply when using [`innerHTML`](https://docs.so
1111

1212
To protect your application from XSS attacks:
1313

14-
1. Avoid using [`innerHTML`](/reference/jsx-attributes/innerhtml-or-textcontent#innerhtml-or-textcontent) when possible.
15-
If necessary, make sure to sanitize user-supplied data with libraries such as [DOMPurify](https://github.com/cure53/DOMPurify).
16-
2. Validate and sanitize user inputs.
17-
Always validate form inputs on the server in addition to the client.
18-
3. Set a Content Security Policy (CSP).
19-
4. Sanitize attributes containing user-supplied data within `<noscript>` elements.
20-
This includes both the attributes of the `<noscript>` element itself and its children.
14+
- Avoid using [`innerHTML`](/reference/jsx-attributes/innerhtml-or-textcontent#innerhtml-or-textcontent) when possible.
15+
If necessary, make sure to sanitize user-supplied data with libraries such as [DOMPurify](https://github.com/cure53/DOMPurify).
16+
- Validate and sanitize user inputs.
17+
Always validate form inputs on the server in addition to the client.
18+
- Set a Content Security Policy (CSP).
19+
- Sanitize attributes containing user-supplied data within `<noscript>` elements.
20+
This includes both the attributes of the `<noscript>` element itself and its children.
2121

2222
We highly recommend reading the [Cross Site Scripting Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html) for further guidance.
2323

0 commit comments

Comments
 (0)