You want to allow untrusted users to supply HTML for output on your website (e.g. Declare the parameter type to be int (with strict typing enabled), and consider using an assertion library like Webmozart Assert to require the incoming data to be greater than 0 before any other work is done in the method. The encodeURI() function encodes a URI by replacing each instance of certain characters by one, two, three, or four escape sequences representing the UTF-8 encoding of the character (will only be four escape sequences for characters composed of two "surrogate" characters). Events. You want to allow untrusted users to supply HTML for output on your website (e.g. context {Object}: The context object Let’s have a look at some of the types of checks along with their examples: String Sanitization – FILTER_SANITIZE_STRING: This removes all the HTML tags from a string. javascript html-parsing. Sanitize untrusted HTML (to prevent XSS) Problem. Log. sanitize-html is intended for use with Node.js and supports Node 10+. You need to clean this HTML to avoid cross-site scripting (XSS) attacks. In case of browsers that don't support document.implementation.createHTMLDocument, like Internet Explorer 8, the built-in sanitize function returns the HTML as is. Works as a regular helper or block helper. It is a common mistake to use block list validation in order to try to detect possibly dangerous characters and patterns like the apostrophe ' character, the string 1=1, or the