- Notifications
You must be signed in to change notification settings - Fork157
Safely add untrusted strings to HTML/XML markup.
License
NotificationsYou must be signed in to change notification settings
pallets/markupsafe
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
MarkupSafe implements a text object that escapes characters so it issafe to use in HTML and XML. Characters that have special meanings arereplaced so that they display as the actual characters. This mitigatesinjection attacks, meaning untrusted user input can safely be displayedon a page.
>>>from markupsafeimport Markup, escape>>># escape replaces special characters and wraps in Markup>>> escape("<script>alert(document.cookie);</script>")Markup('<script>alert(document.cookie);</script>')>>># wrap in Markup to mark text "safe" and prevent escaping>>> Markup("<strong>Hello</strong>")Markup('<strong>hello</strong>')>>> escape(Markup("<strong>Hello</strong>"))Markup('<strong>hello</strong>')>>># Markup is a str subclass>>># methods and operators escape their arguments>>> template= Markup("Hello <em>{name}</em>")>>> template.format(name='"World"')Markup('Hello <em>"World"</em>')
The Pallets organization develops and supports MarkupSafe and otherpopular packages. In order to grow the community of contributors andusers, and allow the maintainers to devote more time to the projects,please donate today.
About
Safely add untrusted strings to HTML/XML markup.