import sanitizeHtmlLib from 'sanitize-html';
/**
* For now, we're using sanitize-html's default set
* of allowed tags and attributes, which don't even include img elements
*
* It is known many client depends on pontentially vulnerable tags, such as script tags
* We chose to be restrictive at first, and document those restrictions later.
*
* When expanding the set of allowed tags and attributes, please consider performance, privacy and security.
*
* This possibily breaks compatibility with Portal and Store Framework,
* which both allows an enormous amount of tags and attributes
*
* This was a thoughtful decision that can be reviewed in the future given
* research was made to back up those changes.
*/
export declare const sanitizeHtml: (dirty: Parameters[0], options?: Parameters[1]) => string;
//# sourceMappingURL=sanitizeHtml.d.ts.map