Documentation / Tutorials / Awesome Enterprise
To prevent XSS attacks of the Forms
/ Awesome Enterprise / To prevent XSS attacks of the Forms
Add your forms html in the [html.trusted] shortcode.
add the “data-safe_id='[app.safe_id /]’” attribute to your all form elements scripts and form tag itself.
Sample:
[html.trusted] <form data-safe_id='[app.safe_id /]' class="sample-form" method="post" novalidate> <div class="form-group"> <div class="label-wrapper"> <label class="field-label">Enter Name</label> </div> <div class="field-wrapper"> <input type="text" name="name" class="form-control" placeholder="Enter Name" data-safe_id='[app.safe_id /]'> <p class="help-block"></p> </div> </div> <div class="form-group"> <div class="label-wrapper"> <label class="field-label"></label> </div> <div class="field-wrapper"> <input type="submit" name="submit" value="Submit" class="submit1" data-safe_id='[app.safe_id /]'> <p class="help-block"></p> </div> </div> </form> [session_ticket.create nonce=yes set=module.ticket_id/] [arr.create set="module.collection"] [post_type]m_samples[/post_type] [/arr.create] [session_ticket.set_activity {module.ticket_id} collection='{module.collection}' module='{module.slug}.save_data' /] <script data-safe_id='[app.safe_id /]' type="spa/axn" axn='form.ajax' route_ajax='t/[module.ticket_id /]' bind='submit' bind_selector='.sample-form' ></script> [/html.trusted]
Also include the DOMPurify library in your awesome-js app.
sample can be found in DesignCafe dev site.