feat(security): harden input sanitization and expand blocked domains

- Escape backticks in `sanitizeInput` to prevent template injection risks
- Add `sharklasers.com` and `guerrillamail.net` to blocked email domains
- Update `src/utils/security.test.ts` with new test cases

Co-authored-by: ragusa-it <196988693+ragusa-it@users.noreply.github.com>
This commit is contained in:
google-labs-jules[bot]
2026-02-07 01:40:06 +00:00
parent 2587b9dd29
commit 637b3d9dcd
3 changed files with 12 additions and 1 deletions

View File

@@ -10,6 +10,7 @@ describe('Security Utils', () => {
expect(sanitizeInput('foo & bar')).toBe('foo &amp; bar');
expect(sanitizeInput('"quotes"')).toBe('&quot;quotes&quot;');
expect(sanitizeInput("'single quotes'")).toBe('&#039;single quotes&#039;');
expect(sanitizeInput('`backticks`')).toBe('&#96;backticks&#96;');
expect(sanitizeInput('>')).toBe('&gt;');
});
@@ -74,6 +75,8 @@ describe('Security Utils', () => {
expect(isValidEmail('spam@mailinator.com')).toBe(false);
expect(isValidEmail('bot@yopmail.com')).toBe(false);
expect(isValidEmail('temp@temp-mail.org')).toBe(false);
expect(isValidEmail('spam@sharklasers.com')).toBe(false);
expect(isValidEmail('spam@guerrillamail.net')).toBe(false);
});
it('rejects blocked domains regardless of case', () => {

View File

@@ -14,7 +14,8 @@ export function sanitizeInput(input: string): string {
.replace(/</g, "&lt;")
.replace(/>/g, "&gt;")
.replace(/"/g, "&quot;")
.replace(/'/g, "&#039;");
.replace(/'/g, "&#039;")
.replace(/`/g, "&#96;");
}
// Common disposable email providers and invalid domains
@@ -25,6 +26,8 @@ const BLOCKED_DOMAINS = new Set([
"yopmail.com",
"temp-mail.org",
"guerrillamail.com",
"guerrillamail.net",
"sharklasers.com",
"10minutemail.com",
"trashmail.com",
]);