Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork165
Safely add untrusted strings to HTML/XML markup.
License
pallets/markupsafe
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
MarkupSafe implements a text object that escapes characters so it issafe to use in HTML and XML. Characters that have special meanings arereplaced so that they display as the actual characters. This mitigatesinjection attacks, meaning untrusted user input can safely be displayedon a page.
>>>from markupsafeimport Markup, escape>>># escape replaces special characters and wraps in Markup>>> escape("<script>alert(document.cookie);</script>")Markup('<script>alert(document.cookie);</script>')>>># wrap in Markup to mark text "safe" and prevent escaping>>> Markup("<strong>Hello</strong>")Markup('<strong>hello</strong>')>>> escape(Markup("<strong>Hello</strong>"))Markup('<strong>hello</strong>')>>># Markup is a str subclass>>># methods and operators escape their arguments>>> template= Markup("Hello <em>{name}</em>")>>> template.format(name='"World"')Markup('Hello <em>"World"</em>')
The Pallets organization develops and supports MarkupSafe and otherpopular packages. In order to grow the community of contributors andusers, and allow the maintainers to devote more time to the projects,please donate today.
See ourdetailed contributing documentation for many ways tocontribute, including reporting issues, requesting features, asking or answeringquestions, and making PRs.
About
Safely add untrusted strings to HTML/XML markup.
Topics
Resources
License
Code of conduct
Security policy
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Sponsor this project
Uh oh!
There was an error while loading.Please reload this page.