Skip to content

FEATURE REQUEST: JS Literal Sanitising #121

Open
@pbower

Description

@pbower

In the attached documentation, the recommended approach for sending data to the client from the server is a JS literal, however I believe this has the potential for malicious arbitrary code injection https://core-docs.highchartspython.com/en/latest/quickstart.html.

Is there a recommended way around this ? If not, is there a feature that could be developed within the HighCharts front-end library to sanitise the received JS literal for consistency with the API?

Benefits of this feature could include:

  1. Developers do not each need to create their own sanitisation based on the API (which is subject to change).
  2. Improved security of the library.
  3. Avoid overhead of using JSON in its place (converting to/from JSON).

Thanks heaps

PB

Metadata

Metadata

Assignees

Labels

enhancementNew feature or request

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions