Files
edx-platform/scripts
Samuel Walladge 71fcf6e725 Fix issues with xss linters
Improve accuracy of javascript-escape linter: Previously this would
match on FOOescape() and FOO.escape calls, but neither are the global
escape function we are worried about.

The regex probably isn't 100% accurate; there may be still false
positives (javascript allows a large range of characters in identifiers,
some of which may not be covered by [\w.$]). The main thing is to avoid
false negatives here though - this will definitely catch any use of
`escape()` or `window.escape()`.

Also remove javascript-interpolate lint - this was deemed unecessary.
StringUtils.interpolate is not in fact safe (it does no html escaping),
so the results of this lint are misleading.
2020-05-04 09:27:18 +09:30
..
2019-12-30 12:25:38 -05:00
2020-05-04 09:27:18 +09:30
2016-03-12 21:12:06 -05:00
2017-12-08 14:38:41 -05:00
2019-12-30 10:35:30 -05:00
2019-12-30 10:35:30 -05:00