We had posted earlier about making sure that (malicious) users cannot inject code into Kerika, in any of the areas where user input is possible.
Here’s the complete list of user actions that we are checking for XSS injecton now:
- Board Name
- Board Description
- Template Name
- Template Description
- Tag Name
- Card Attachment Name
- Board Attachment Name
- Card Chat
- Board Chat
- Column Name
- Task Name/Detail
- Canvas Text
- Canvas Attachment Name
- Canvas Shape/Object Name
- Account Name
- Account Billing Information
- User’s Name