@r@dcc@w@p@kirby@Moon@romin >Sanitize user field name I'm getting deja vu. Will merge a little later, thanks, for now my CSP should prevent any leakage.
@r It might break user's custom CSS field, so I removed it entirely anyway in my fork, but I think that might be solved by making a special path that just returns stored CSS from cookie and adding said path to the policy.
@romin@r Figured much. (using a basic table makes more sense from design perspective that just appending the values separated with dash to the bio) Screenshot_20230922_195132.png
@mint No, that field is sanitized by the server. It's a bit confusing, because only a specific fields are supposed to be sanitized by the server, but other fields may have HTML content anyway. Get the Swagger doc JSON from https://api.pleroma.social/ and look for the fields with "format": "html".
@laurel@mint Yes, when the content itself is in HTML, you'd want to show it as it is, without escaping. For example all your posts are presented as HTML by the server. There other cases like showing emoji as <img> tag instead of :emoji: where the client has to create HTML code from plain text.