import sanitizeHtmlLib from 'sanitize-html'; /** * For now, we're using sanitize-html's default set * of allowed tags and attributes, which don't even include img elements * * It is known many client depends on pontentially vulnerable tags, such as script tags * We chose to be restrictive at first, and document those restrictions later. * * When expanding the set of allowed tags and attributes, please consider performance, privacy and security. * * This possibily breaks compatibility with Portal and Store Framework, * which both allows an enormous amount of tags and attributes * * This was a thoughtful decision that can be reviewed in the future given * research was made to back up those changes. */ export declare const sanitizeHtml: (dirty: Parameters[0], options?: Parameters[1]) => string; //# sourceMappingURL=sanitizeHtml.d.ts.map