eslint-plugin-no-unsanitized VS java-html-sanitizer

Compare eslint-plugin-no-unsanitized vs java-html-sanitizer and see what are their differences.

eslint-plugin-no-unsanitized

Custom ESLint rule to disallows unsafe innerHTML, outerHTML, insertAdjacentHTML and alike (by mozilla)

java-html-sanitizer

Takes third-party HTML and produces HTML that is safe to embed in your web application. Fast and easy to configure. (by owasp)
SurveyJS - Open-Source JSON Form Builder to Create Dynamic Forms Right in Your App
With SurveyJS form UI libraries, you can build and style forms in a fully-integrated drag & drop form builder, render them in your JS app, and store form submission data in any backend, inc. PHP, ASP.NET Core, and Node.js.
surveyjs.io
featured
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
eslint-plugin-no-unsanitized java-html-sanitizer
2 2
215 818
0.9% 0.6%
4.6 7.7
11 days ago 14 days ago
JavaScript Java
Mozilla Public License 2.0 GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

eslint-plugin-no-unsanitized

Posts with mentions or reviews of eslint-plugin-no-unsanitized. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-10-17.
  • Escaping user input is ridonkulously hard
    2 projects | /r/programming | 17 Oct 2022
    Prevent any uses of setting innerHTML or similar functions e.g. via an eslint plugin.
  • HTML Sanitizer API
    5 projects | news.ycombinator.com | 6 May 2021
    Great point!

    It wanted to edit the comment to change (1) to (server/client) but I passed my edit timeout.

    I would include your (5) within (1). `textContent` and other DOM methods like `setAttribute` are effectively secure output-escaping on the client.

    Your (5a) is an excellent extra measure. In this area, I'd also add security-focused linting for (1) and (5)–e.g. for (5), to ensure secure DOM methods are used, I use Mozilla's `eslint-plugin-no-unsanitized`[0] plugin for all my personal & work projects.

    [0] https://github.com/mozilla/eslint-plugin-no-unsanitized/

java-html-sanitizer

Posts with mentions or reviews of java-html-sanitizer. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-12-03.
  • A simple Java library that extracts text from a valid HTML
    2 projects | /r/javahelp | 3 Dec 2022
    Is there any reason not to use OWASP Html Sanitizer for this use case?
  • HTML Sanitizer API
    5 projects | news.ycombinator.com | 6 May 2021
    My thoughts as a maintainer of a HTML sanitizer https://github.com/microcosm-cc/bluemonday

    1. Sanitizing is not difficult, defining the policy/config is difficult as your need is not someone else's. First glance of this proposal is that this needs a lot more work to cover people's needs. It's good enough, but will have a lot of edges and will need to evolve.

    2. If you allow a blocklist then people will use that by default as it's easier to say "I don't want " than it is to say "I only accept 3. Even if you sanitize something you should keep the raw input... you should store the raw input alongside the sanitized (in fact the sanitized is merely a cached version of the raw input having been sanitized). The reason for this is you will have issues you need to debug (and can't without the input) and you will have round-trip edits you should support (but it's not round-trippable when everything you return is different from the input, do not punish a user who pasted HTML thinking it was safe by then not allowing them to edit it out because you threw everything away). Additionally if you want to ever report on the input, i.e. topK values, and you've modified the input and not kept raw, then you can never do this.

    4. Provide a sane default. Most engineers simply do not know what is safe or not. I ship a policy in bluemonday for user generated content... it is safe by default and good enough for most people, and it can be taken and extended due to the way the API is structured so can cover other scenarios as a foundation policy.

    I think the proposal in general: specify a standard for a sanitization API has merit. But mostly it has merit if it specifies a standard for defining sanitization policies/configuration, allowing them to be portable across different languages and systems.

    The one I wrote is very heavily inspired by https://github.com/owasp/java-html-sanitizer which is the OWASP project one maintained by Mike Samuel. When I did my research before writing the Go one, this was far and away the best way to construct the policy/config and I already saw that this perspective was more valuable than whether it's a token based parser (GIGO but low memory) or a DOM builder (more memory)... no-one cares about the internals, they care about expressing what safe means to them.

What are some alternatives?

When comparing eslint-plugin-no-unsanitized and java-html-sanitizer you can also consider the following projects:

big-list-of-naughty-strings - The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.

bluemonday - bluemonday: a fast golang HTML sanitizer (inspired by the OWASP Java HTML Sanitizer) to scrub user generated content of XSS

content - The content behind MDN Web Docs

You-Dont-Need-Lodash-Underscore - List of JavaScript methods which you can use natively + ESLint Plugin

XO - ❤️ JavaScript/TypeScript linter (ESLint wrapper) with great defaults

html-extractor - A simple library that parses HTML input and extracts plain text from valid tags - made for fun, no regex :)