Dangersouly Set innerHTML Back

Improper use of the innerHTML can open you up to a cross-site scripting (XSS) attack.

React's design philosophy is that it should be "easy" to make things safe, and developers should explicitly state their intent when performing "unsafe" operations. The prop name dangerouslySetInnerHTML is intentionally chosen to be frightening, and the prop value (an object instead of a string) can be used to indicate sanitized(淨化的) data.

After fully understanding the security ramifications(後果) and properly sanitizing the data, create a new object containing only the key __html and your sanitized data as the value. Here is an example using the JSX syntax:

var MyComponent = React.createClass({
    createMarkup: function () {
        return { __html: 'First · Second' };
    },

    render: function () {
        return (
            <div dangerouslySetInnerHTML={createMarkup()} ></div>
        );
    }
});

ReactDOM.render(
    <MyComponent />,
    document.getElementById('content')
);
Empty Comments
Sign in GitHub

As the plugin is integrated with a code management system like GitLab or GitHub, you may have to auth with your account before leaving comments around this article.

Notice: This plugin has used Cookie to store your token with an expiration.