You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/7.api/1.use-head-safe.md
+13-9
Original file line number
Diff line number
Diff line change
@@ -9,23 +9,23 @@ The `useHeadSafe` composable is a wrapper around the [useHead](/guide/composable
9
9
10
10
There is a whitelist of allowed tags and attributes. If you try to use a tag or attribute that isn't on the whitelist, it will be ignored.
11
11
12
-
The whitelist is very restrictive, as there are many vectors for XSS attacks. If you need to use a tag or attribute that isn't on the whitelist, you can use the [useHead](/guide/composables/use-head) composable instead,
12
+
The whitelist is restrictive, as there are many vectors for XSS attacks. If you need to use a tag or attribute that isn't on the whitelist, you can use the [useHead](/guide/composables/use-head) composable instead,
- Style tags and attributes not supported `<link rel="stylesheet" ...>`{lang="html"}, `<style>`{lang="html"}, they are a vector for XSS attacks and clickjacking.
29
29
- Scripts of any sort are not allowed, except for JSON. `<script type="application/json">`{lang="html"}, use `textContent: myObject`.
While styles are permitted it's important to note that [clickjacking](https://en.wikipedia.org/wiki/Clickjacking) is still possible. You should ensure that your styles are safe to use.
0 commit comments