Sha256: a5aca9516cbd07c5937e6cb087deab4e3442223d794f3cb09ea1bed544dba110
Contents?: true
Size: 1.28 KB
Versions: 1
Compression:
Stored size: 1.28 KB
Contents
# Scrub Params :lock: Secure Rails parameters by default HTML has no business in most parameters. Take the **whitelist approach** and remove it by default. **Note:** Rails has done amazing work to prevent XSS, but storing `<script>badThings()</script>` in your database makes it much easier to make mistakes. Works with Rails 3.2 and above. ## Get Started Add this line to your application’s Gemfile: ```ruby gem 'scrub_params' ``` You now have another line of defense against [cross-site scripting (XSS)](http://en.wikipedia.org/wiki/Cross-site_scripting). ### Test It Submit HTML in one of your forms. ```html Hello <script>alert('World')</script> ``` This becomes: ``` Hello alert('World') ``` And you should see this in your logs: ``` Scrubbed parameters: name ``` ### Whitelist Actions To prevent certain actions from being scrubbed, use: ```ruby skip_before_filter :scrub_params, only: [:create, :update] ``` ## TODO - whitelist parameters - whitelist tags ## Contributing Everyone is encouraged to help improve this project. Here are a few ways you can help: - [Report bugs](https://github.com/ankane/scrub_params/issues) - Fix bugs and [submit pull requests](https://github.com/ankane/scrub_params/pulls) - Write, clarify, or fix documentation - Suggest or add new features
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
scrub_params-0.0.2 | README.md |