diff --git a/README.md b/README.md index e787fb0..4e0d157 100644 --- a/README.md +++ b/README.md @@ -7,135 +7,24 @@ Status: * The Sanitizer API is currently being incubated in the [Sanitizer API](https://github.com/WICG/sanitizer-api) [WICG](https://wicg.io/), - with the goal of bringing this as a standard into the - [W3C WebAppSec Working Group](https://www.w3.org/2011/webappsec/). -* Early implementations are available in [select web browsers](#Implementations). + with the goal of bringing this to the [WHATWG](https://whatwg.org/). * The API is not finalized and still subject to change. Here you can find additional information: -* The [draft specification](https://wicg.github.io/sanitizer-api/). -* A list of [questions & answers](faq.md). -* [MDN Web Docs](https://developer.mozilla.org/en-US/docs/Web/API/HTML_Sanitizer_API). * Implementation Status: * [Mozilla position](https://github.com/mozilla/standards-positions/issues/106), - [Chrome Status](https://www.chromestatus.com/feature/5786893650231296), - [WebKit position](https://lists.webkit.org/pipermail/webkit-dev/2021-March/031738.html). + [WebKit position](https://github.com/WebKit/standards-positions/issues/86), + [Chrome Status](https://www.chromestatus.com/feature/5786893650231296). * [Can I use 'Sanitizer API'](https://caniuse.com/mdn-api_sanitizer)? - * [Web Platform Tests](https://wpt.fyi/results/sanitizer-api?label=experimental&label=master&aligned) + * [Web Platform Tests]( https://wpt.fyi/results/sanitizer-api?label=experimental&label=master&aligned) ([test source](https://github.com/web-platform-tests/wpt/tree/master/sanitizer-api)). -* The [Sanitizer API Playground](https://sanitizer-api.dev) is an easy way to - play with the API, if it's enabled in your browser. * An early [W3C TAG review](https://github.com/w3ctag/design-reviews/issues/619). -* The [original explainer](explainer.md) goes into more detail about why - we are proposing this as a new standard (rather than a library). The API - proposed there is a little outdated, however. - -## Implementations - -If you wish to try out early Sanitizer implementations, the -[FAQ](faq.md#can-i-use-the-sanitizer-in-my-app) has you covered: - -> Firefox: Go to about:config, search for the dom.security.sanitizer.enabled flag and set it to true -> -> Chromium / Chrome: Start the browser with the --enable-blink-features=SanitizerAPI flag. ## Explainer -The core API of the Sanitizer is rather simple: Take arbitrary HTML, then -parse and modify it to remove script content. The goal is to allow safe handling -of user-supplied HTML, without danger of -[Cross-Site Scripting (XSS)](https://en.wikipedia.org/wiki/Cross-site_scripting). - -The Sanitzer is safe by default, which means it has built-in rules about which -markup to keep or to discard. Developers can customize the Sanitizer to suit -the needs of their applications. But the sanitization rules cannot be relaxed -below a built-in, safe baseline configuration. - -The core API of the Sanitizer is this: - -Example: -```js - // Every webapp has to deal with untrusted input in some form. It could be - // data off the network; from query parameters; any user inputs; or - // (sometimes) even from ones own server. Here, we use the simplest form as - // an example and get data right out of a