{ "name": "resanitize", "author": { "name": "Dan MacTough", "email": "danmactough@gmail.com" }, "description": "Regular expression-based HTML sanitizer and ad remover, geared toward RSS feed descriptions", "version": "0.3.0", "keywords": [ "sanitize", "html", "regexp", "security" ], "homepage": "http://github.com/danmactough/node-resanitize", "repository": { "type": "git", "url": "git://github.com/danmactough/node-resanitize.git" }, "bugs": { "url": "http://github.com/danmactough/node-resanitize/issues" }, "main": "./resanitize.js", "engines": { "node": ">= 0.6.0" }, "dependencies": { "validator": "~1.5.1" }, "devDependencies": { "mocha": "~1.13.0" }, "licenses": [ { "type": "MIT", "url": "https://raw.github.com/danmactough/node-resanitize/master/LICENSE" } ], "directories": { "test": "test" }, "scripts": { "test": "mocha" }, "license": "MIT", "readme": "# Resanitize - Regular expression-based HTML sanitizer and ad remover, geared toward RSS feed descriptions\n\nThis node.js module provides functions for removing unsafe parts and ads from\nHTML. I am using it for the <description> element of RSS feeds.\n\n## Installation\n\nnpm install resanitize\n\n## Usage\n\n```javascript\n\n var resanitize = require('resanitize')\n , html = '
Headline
'\n ;\n\n resanitize(html); // => '
Headline
'\n```\n\n## Notes\n\nThis module's opinion of \"sanitized\" might not meet your security requirements.\nThe mere fact that it uses regular expressions should make this disclaimer\nunnecessary, but just to be clear: if you intend to display arbitrary user input\nthat includes HTML, you're going to want something more robust.\n\nAs of v0.3.0, we've added [node-validator's](//github.com/chriso/node-validator) XSS\nfilter. It's certainly an improvement, but still -- be careful. Any concerns\nabout XSS attacks should be directered to [node-validator's issue tracker](//github.com/chriso/node-validator/issues).\n\nNote that the `stripUnsafeTags` method will loop over the strip an arbitrary\nnumber of times (2) to try to strip maliciously nested html tags. After the\nmaximum number of iterations is reached, if the string still appears to contain\nany unsafe tags, it is deemed unsafe and set to an empty string. If this seems\nunexpected and/or is causing any problems, please raise an [issue](//github.com/danmactough/node-resanitize/issues).", "readmeFilename": "README.md", "_id": "resanitize@0.3.0", "dist": { "shasum": "dfcb2bf2ae1df2838439ed6cd04c78845c532353", "tarball": "http://registry.npmjs.org/resanitize/-/resanitize-0.3.0.tgz" }, "_from": "resanitize@*", "_npmVersion": "1.3.11", "_npmUser": { "name": "danmactough", "email": "danmactough@gmail.com" }, "maintainers": [ { "name": "danmactough", "email": "danmactough@gmail.com" } ], "_shasum": "dfcb2bf2ae1df2838439ed6cd04c78845c532353", "_resolved": "https://registry.npmjs.org/resanitize/-/resanitize-0.3.0.tgz" }