[Owasp-antisamy] I am here!
arshan.dabirsiaghi at aspectsecurity.com
Tue Jan 8 17:02:21 EST 2008
This is why I pass the XML document fragment back in the CleanResults object, so you can do any custom
post-processing or XSLT translations. In 1.01 we will be encoding all special characters in dangling text nodes
and I anticipate that coming in the next month or so.
>You would be better off using the HTMLEntityEncoder OWASP utility for
>> I am newbie to AntiSamy. Is it possible to replace special characters
>> such as # $ with numeric values # $ using AntiSamy class which
>> returns CleanResults object?
>> I see that it is automatical done for '&' character when CleanResults
>> .getCleanHTML() is called.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Owasp-antisamy