import sanitizeHtmlLib from 'sanitize-html' /** * For now, we're using sanitize-html's default set * of allowed tags and attributes, which don't even include img elements * * It is known many client depends on pontentially vulnerable tags, such as script tags * We chose to be restrictive at first, and document those restrictions later. * * When expanding the set of allowed tags and attributes, please consider performance, privacy and security. * * This possibily breaks compatibility with Portal and Store Framework, * which both allows an enormous amount of tags and attributes * * This was a thoughtful decision that can be reviewed in the future given * research was made to back up those changes. */ export const sanitizeHtml = ( dirty: Parameters[0], options?: Parameters[1] ) => sanitizeHtmlLib(dirty, options)