feat(security): escape backticks in sanitizeInput
- Update `sanitizeInput` in `src/utils/security.ts` to escape backticks (`) to ```. - Add test case in `src/utils/security.test.ts` to verify backtick escaping. - This mitigates potential XSS risks in contexts where template literals might be used. Co-authored-by: ragusa-it <196988693+ragusa-it@users.noreply.github.com>
This commit is contained in:
@@ -13,6 +13,10 @@ describe('Security Utils', () => {
|
||||
expect(sanitizeInput('>')).toBe('>');
|
||||
});
|
||||
|
||||
it('escapes backticks', () => {
|
||||
expect(sanitizeInput('`exec`')).toBe('`exec`');
|
||||
});
|
||||
|
||||
it('returns non-string input as is', () => {
|
||||
// @ts-ignore
|
||||
expect(sanitizeInput(123)).toBe(123);
|
||||
|
||||
@@ -14,7 +14,8 @@ export function sanitizeInput(input: string): string {
|
||||
.replace(/</g, "<")
|
||||
.replace(/>/g, ">")
|
||||
.replace(/"/g, """)
|
||||
.replace(/'/g, "'");
|
||||
.replace(/'/g, "'")
|
||||
.replace(/`/g, "`");
|
||||
}
|
||||
|
||||
// Common disposable email providers and invalid domains
|
||||
|
||||
Reference in New Issue
Block a user