Drupal investigation

HSA Test User c16dcac362 User import %!s(int64=7) %!d(string=před) roky
..
doc c16dcac362 User import %!s(int64=7) %!d(string=před) roky
src c16dcac362 User import %!s(int64=7) %!d(string=před) roky
CHANGELOG.md c16dcac362 User import %!s(int64=7) %!d(string=před) roky
CONDUCT.md c16dcac362 User import %!s(int64=7) %!d(string=před) roky
CONTRIBUTING.md c16dcac362 User import %!s(int64=7) %!d(string=před) roky
LICENSE.md c16dcac362 User import %!s(int64=7) %!d(string=před) roky
README.md c16dcac362 User import %!s(int64=7) %!d(string=před) roky
composer.json c16dcac362 User import %!s(int64=7) %!d(string=před) roky
mkdocs.yml c16dcac362 User import %!s(int64=7) %!d(string=před) roky

README.md

zend-escaper

Build Status Coverage Status

The OWASP Top 10 web security risks study lists Cross-Site Scripting (XSS) in second place. PHP’s sole functionality against XSS is limited to two functions of which one is commonly misapplied. Thus, the zend-escaper component was written. It offers developers a way to escape output and defend from XSS and related vulnerabilities by introducing contextual escaping based on peer-reviewed rules.