Sanitizing

To prevent Cross Site Scripting (XSS) attacks, Jam.py sanitizes field values displayed in the table columns.

For example, if field contains the following text:

"<span style='color: red'>USA</span>"

when un-sanitized, it will be displayed in the table column as follows:

unsanitized.png

When the field text is sanitized, it is transformed to the following:

"&lt;span style='color: red'&gt;USA&lt;/span&gt;"

as you can see symbols ‘<’ and ‘>’ are replaced with ‘&lt;’ and ‘&gt;’ and the table column will be displayed this way:

sanitized.png

There are two ways to prevent sanitizing.

First is to set Do not sanitize attribute in the Interface tab in the Field Editor Dialog

do_not_sanitize.png

Second is to write the on_field_get_html event handler. If the this event handler returns a value it is not sanitized.