summaryrefslogtreecommitdiff
path: root/doc/news
diff options
context:
space:
mode:
authorjoey <joey@0fa5a96a-9a0e-0410-b3b2-a0fd24251071>2006-04-25 03:18:21 +0000
committerjoey <joey@0fa5a96a-9a0e-0410-b3b2-a0fd24251071>2006-04-25 03:18:21 +0000
commitd7aecf6ddc19d1dac30ec5616134c2a7e7f4d573 (patch)
tree8fd8153d97e2e5ce8e96533d1f750a71e789ab52 /doc/news
parent5e1db8afa91c027284e4a800449b6a5a00b4d12e (diff)
implemented html sanitisation
Diffstat (limited to 'doc/news')
-rw-r--r--doc/news/sanitization.html7
1 files changed, 7 insertions, 0 deletions
diff --git a/doc/news/sanitization.html b/doc/news/sanitization.html
new file mode 100644
index 000000000..6ce254157
--- /dev/null
+++ b/doc/news/sanitization.html
@@ -0,0 +1,7 @@
+ikiwiki's main outstanding security hole, lack of [[HtmlSanitization]] has
+now been addressed. ikiwiki now sanitizes html by default.
+
+If only trusted parties can edit your wiki's content, then you might want
+to turn this sanitization back off to allow use of potentially dangerous
+tags. To do so, pass --no-sanitize or set "sanitize =&gt; 0," in your
+[[ikiwiki.setup]].