dompurify 3.0.5 → 3.0.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -1,12 +1,12 @@
1
1
  # DOMPurify
2
2
 
3
- [![npm version](https://badge.fury.io/js/dompurify.svg)](http://badge.fury.io/js/dompurify) ![Build and Test](https://github.com/cure53/DOMPurify/workflows/Build%20and%20Test/badge.svg?branch=main) [![Downloads](https://img.shields.io/npm/dm/dompurify.svg)](https://www.npmjs.com/package/dompurify) [![minified size](https://badgen.net/bundlephobia/min/dompurify?color=green&label=minified)](https://cdn.jsdelivr.net/npm/dompurify/dist/purify.min.js) [![gzip size](https://badgen.net/bundlephobia/minzip/dompurify?color=green&label=gzipped)](https://packagephobia.now.sh/result?p=dompurify) [![dependents](https://badgen.net/github/dependents-repo/cure53/dompurify?color=green&label=dependents)](https://github.com/cure53/DOMPurify/network/dependents)
3
+ [![npm version](https://badge.fury.io/js/dompurify.svg)](http://badge.fury.io/js/dompurify) ![Build and Test](https://github.com/cure53/DOMPurify/workflows/Build%20and%20Test/badge.svg?branch=main) [![Downloads](https://img.shields.io/npm/dm/dompurify.svg)](https://www.npmjs.com/package/dompurify) ![npm package minimized gzipped size (select exports)](https://img.shields.io/bundlejs/size/dompurify?color=%233C1&label=minified) ![GitHub code size in bytes](https://img.shields.io/github/languages/code-size/cure53/dompurify?color=%233C1) [![dependents](https://badgen.net/github/dependents-repo/cure53/dompurify?color=green&label=dependents)](https://github.com/cure53/DOMPurify/network/dependents)
4
4
 
5
5
  [![NPM](https://nodei.co/npm/dompurify.png)](https://nodei.co/npm/dompurify/)
6
6
 
7
7
  DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG.
8
8
 
9
- It's also very simple to use and get started with. DOMPurify was [started in February 2014](https://github.com/cure53/DOMPurify/commit/a630922616927373485e0e787ab19e73e3691b2b) and, meanwhile, has reached version **v3.0.5**.
9
+ It's also very simple to use and get started with. DOMPurify was [started in February 2014](https://github.com/cure53/DOMPurify/commit/a630922616927373485e0e787ab19e73e3691b2b) and, meanwhile, has reached version **v3.0.7**.
10
10
 
11
11
  DOMPurify is written in JavaScript and works in all modern browsers (Safari (10+), Opera (15+), Edge, Firefox and Chrome - as well as almost anything else using Blink, Gecko or WebKit). It doesn't break on MSIE or other legacy browsers. It simply does nothing.
12
12
 
@@ -39,7 +39,7 @@ It's easy. Just include DOMPurify on your website.
39
39
  Afterwards you can sanitize strings by executing the following code:
40
40
 
41
41
  ```js
42
- let clean = DOMPurify.sanitize(dirty);
42
+ const clean = DOMPurify.sanitize(dirty);
43
43
  ```
44
44
 
45
45
  Or maybe this, if you love working with Angular or alike:
@@ -47,14 +47,14 @@ Or maybe this, if you love working with Angular or alike:
47
47
  ```js
48
48
  import * as DOMPurify from 'dompurify';
49
49
 
50
- let clean = DOMPurify.sanitize('<b>hello there</b>');
50
+ const clean = DOMPurify.sanitize('<b>hello there</b>');
51
51
  ```
52
52
 
53
53
  The resulting HTML can be written into a DOM element using `innerHTML` or the DOM using `document.write()`. That is fully up to you.
54
54
  Note that by default, we permit HTML, SVG **and** MathML. If you only need HTML, which might be a very common use-case, you can easily set that up as well:
55
55
 
56
56
  ```js
57
- let clean = DOMPurify.sanitize(dirty, { USE_PROFILES: { html: true } });
57
+ const clean = DOMPurify.sanitize(dirty, { USE_PROFILES: { html: true } });
58
58
  ```
59
59
 
60
60
  ### Where are the TypeScript type definitions?
@@ -160,62 +160,58 @@ When `DOMPurify.sanitize` is used in an environment where the Trusted Types API
160
160
 
161
161
  Yes. The included default configuration values are pretty good already - but you can of course override them. Check out the [`/demos`](https://github.com/cure53/DOMPurify/tree/main/demos) folder to see a bunch of examples on how you can [customize DOMPurify](https://github.com/cure53/DOMPurify/tree/main/demos#what-is-this).
162
162
 
163
+ ### General settings
163
164
  ```js
164
- /**
165
- * General settings
166
- */
167
-
168
165
  // strip {{ ... }}, ${ ... } and <% ... %> to make output safe for template systems
169
166
  // be careful please, this mode is not recommended for production usage.
170
167
  // allowing template parsing in user-controlled HTML is not advised at all.
171
168
  // only use this mode if there is really no alternative.
172
- var clean = DOMPurify.sanitize(dirty, {SAFE_FOR_TEMPLATES: true});
169
+ const clean = DOMPurify.sanitize(dirty, {SAFE_FOR_TEMPLATES: true});
170
+ ```
173
171
 
174
- /**
175
- * Control our allow-lists and block-lists
176
- */
172
+ ### Control our allow-lists and block-lists
173
+ ```js
177
174
  // allow only <b> elements, very strict
178
- var clean = DOMPurify.sanitize(dirty, {ALLOWED_TAGS: ['b']});
175
+ const clean = DOMPurify.sanitize(dirty, {ALLOWED_TAGS: ['b']});
179
176
 
180
177
  // allow only <b> and <q> with style attributes
181
- var clean = DOMPurify.sanitize(dirty, {ALLOWED_TAGS: ['b', 'q'], ALLOWED_ATTR: ['style']});
178
+ const clean = DOMPurify.sanitize(dirty, {ALLOWED_TAGS: ['b', 'q'], ALLOWED_ATTR: ['style']});
182
179
 
183
180
  // allow all safe HTML elements but neither SVG nor MathML
184
181
  // note that the USE_PROFILES setting will override the ALLOWED_TAGS setting
185
182
  // so don't use them together
186
- var clean = DOMPurify.sanitize(dirty, {USE_PROFILES: {html: true}});
183
+ const clean = DOMPurify.sanitize(dirty, {USE_PROFILES: {html: true}});
187
184
 
188
185
  // allow all safe SVG elements and SVG Filters, no HTML or MathML
189
- var clean = DOMPurify.sanitize(dirty, {USE_PROFILES: {svg: true, svgFilters: true}});
186
+ const clean = DOMPurify.sanitize(dirty, {USE_PROFILES: {svg: true, svgFilters: true}});
190
187
 
191
188
  // allow all safe MathML elements and SVG, but no SVG Filters
192
- var clean = DOMPurify.sanitize(dirty, {USE_PROFILES: {mathMl: true, svg: true}});
189
+ const clean = DOMPurify.sanitize(dirty, {USE_PROFILES: {mathMl: true, svg: true}});
193
190
 
194
191
  // change the default namespace from HTML to something different
195
- var clean = DOMPurify.sanitize(dirty, {NAMESPACE: 'http://www.w3.org/2000/svg'});
192
+ const clean = DOMPurify.sanitize(dirty, {NAMESPACE: 'http://www.w3.org/2000/svg'});
196
193
 
197
194
  // leave all safe HTML as it is and add <style> elements to block-list
198
- var clean = DOMPurify.sanitize(dirty, {FORBID_TAGS: ['style']});
195
+ const clean = DOMPurify.sanitize(dirty, {FORBID_TAGS: ['style']});
199
196
 
200
197
  // leave all safe HTML as it is and add style attributes to block-list
201
- var clean = DOMPurify.sanitize(dirty, {FORBID_ATTR: ['style']});
198
+ const clean = DOMPurify.sanitize(dirty, {FORBID_ATTR: ['style']});
202
199
 
203
200
  // extend the existing array of allowed tags and add <my-tag> to allow-list
204
- var clean = DOMPurify.sanitize(dirty, {ADD_TAGS: ['my-tag']});
201
+ const clean = DOMPurify.sanitize(dirty, {ADD_TAGS: ['my-tag']});
205
202
 
206
203
  // extend the existing array of allowed attributes and add my-attr to allow-list
207
- var clean = DOMPurify.sanitize(dirty, {ADD_ATTR: ['my-attr']});
204
+ const clean = DOMPurify.sanitize(dirty, {ADD_ATTR: ['my-attr']});
208
205
 
209
206
  // prohibit ARIA attributes, leave other safe HTML as is (default is true)
210
- var clean = DOMPurify.sanitize(dirty, {ALLOW_ARIA_ATTR: false});
207
+ const clean = DOMPurify.sanitize(dirty, {ALLOW_ARIA_ATTR: false});
211
208
 
212
209
  // prohibit HTML5 data attributes, leave other safe HTML as is (default is true)
213
- var clean = DOMPurify.sanitize(dirty, {ALLOW_DATA_ATTR: false});
214
-
215
- /**
216
- * Control behavior relating to Custom Elements
217
- */
210
+ const clean = DOMPurify.sanitize(dirty, {ALLOW_DATA_ATTR: false});
211
+ ```
218
212
 
213
+ ### Control behavior relating to Custom Elements
214
+ ```js
219
215
  // DOMPurify allows to define rules for Custom Elements. When using the CUSTOM_ELEMENT_HANDLING
220
216
  // literal, it is possible to define exactly what elements you wish to allow (by default, none are allowed).
221
217
  //
@@ -224,8 +220,7 @@ var clean = DOMPurify.sanitize(dirty, {ALLOW_DATA_ATTR: false});
224
220
  // You can use a RegExp literal to specify what is allowed or a predicate, examples for both can be seen below.
225
221
  // The default values are very restrictive to prevent accidental XSS bypasses. Handle with great care!
226
222
 
227
-
228
- var clean = DOMPurify.sanitize(
223
+ const clean = DOMPurify.sanitize(
229
224
  '<foo-bar baz="foobar" forbidden="true"></foo-bar><div is="foo-baz"></div>',
230
225
  {
231
226
  CUSTOM_ELEMENT_HANDLING: {
@@ -236,7 +231,7 @@ var clean = DOMPurify.sanitize(
236
231
  }
237
232
  ); // <div is=""></div>
238
233
 
239
- var clean = DOMPurify.sanitize(
234
+ const clean = DOMPurify.sanitize(
240
235
  '<foo-bar baz="foobar" forbidden="true"></foo-bar><div is="foo-baz"></div>',
241
236
  {
242
237
  CUSTOM_ELEMENT_HANDLING: {
@@ -245,9 +240,9 @@ var clean = DOMPurify.sanitize(
245
240
  allowCustomizedBuiltInElements: true, // customized built-ins are allowed
246
241
  },
247
242
  }
248
- ); // <foo-bar baz="foobar"></foo-bar><div is=""></div>
243
+ ); // <foo-bar baz="foobar"></foo-bar><div is="foo-baz"></div>
249
244
 
250
- var clean = DOMPurify.sanitize(
245
+ const clean = DOMPurify.sanitize(
251
246
  '<foo-bar baz="foobar" forbidden="true"></foo-bar><div is="foo-baz"></div>',
252
247
  {
253
248
  CUSTOM_ELEMENT_HANDLING: {
@@ -257,82 +252,80 @@ var clean = DOMPurify.sanitize(
257
252
  },
258
253
  }
259
254
  ); // <foo-bar baz="foobar"></foo-bar><div is="foo-baz"></div>
260
-
261
- /**
262
- * Control behavior relating to URI values
263
- */
255
+ ```
256
+ ### Control behavior relating to URI values
257
+ ```js
264
258
  // extend the existing array of elements that can use Data URIs
265
- var clean = DOMPurify.sanitize(dirty, {ADD_DATA_URI_TAGS: ['a', 'area']});
259
+ const clean = DOMPurify.sanitize(dirty, {ADD_DATA_URI_TAGS: ['a', 'area']});
266
260
 
267
261
  // extend the existing array of elements that are safe for URI-like values (be careful, XSS risk)
268
- var clean = DOMPurify.sanitize(dirty, {ADD_URI_SAFE_ATTR: ['my-attr']});
262
+ const clean = DOMPurify.sanitize(dirty, {ADD_URI_SAFE_ATTR: ['my-attr']});
269
263
 
270
- /**
271
- * Control permitted attribute values
272
- */
264
+ ```
265
+ ### Control permitted attribute values
266
+ ```js
273
267
  // allow external protocol handlers in URL attributes (default is false, be careful, XSS risk)
274
268
  // by default only http, https, ftp, ftps, tel, mailto, callto, sms, cid and xmpp are allowed.
275
- var clean = DOMPurify.sanitize(dirty, {ALLOW_UNKNOWN_PROTOCOLS: true});
269
+ const clean = DOMPurify.sanitize(dirty, {ALLOW_UNKNOWN_PROTOCOLS: true});
276
270
 
277
271
  // allow specific protocols handlers in URL attributes via regex (default is false, be careful, XSS risk)
278
272
  // by default only http, https, ftp, ftps, tel, mailto, callto, sms, cid and xmpp are allowed.
279
273
  // Default RegExp: /^(?:(?:(?:f|ht)tps?|mailto|tel|callto|sms|cid|xmpp):|[^a-z]|[a-z+.\-]+(?:[^a-z+.\-:]|$))/i;
280
- var clean = DOMPurify.sanitize(dirty, {ALLOWED_URI_REGEXP: /^(?:(?:(?:f|ht)tps?|mailto|tel|callto|sms|cid|xmpp|xxx):|[^a-z]|[a-z+.\-]+(?:[^a-z+.\-:]|$))/i;});
274
+ const clean = DOMPurify.sanitize(dirty, {ALLOWED_URI_REGEXP: /^(?:(?:(?:f|ht)tps?|mailto|tel|callto|sms|cid|xmpp|xxx):|[^a-z]|[a-z+.\-]+(?:[^a-z+.\-:]|$))/i});
281
275
 
282
- /**
283
- * Influence the return-type
284
- */
276
+ ```
277
+ ### Influence the return-type
278
+ ```js
285
279
  // return a DOM HTMLBodyElement instead of an HTML string (default is false)
286
- var clean = DOMPurify.sanitize(dirty, {RETURN_DOM: true});
280
+ const clean = DOMPurify.sanitize(dirty, {RETURN_DOM: true});
287
281
 
288
282
  // return a DOM DocumentFragment instead of an HTML string (default is false)
289
- var clean = DOMPurify.sanitize(dirty, {RETURN_DOM_FRAGMENT: true});
283
+ const clean = DOMPurify.sanitize(dirty, {RETURN_DOM_FRAGMENT: true});
290
284
 
291
285
  // use the RETURN_TRUSTED_TYPE flag to turn on Trusted Types support if available
292
- var clean = DOMPurify.sanitize(dirty, {RETURN_TRUSTED_TYPE: true}); // will return a TrustedHTML object instead of a string if possible
286
+ const clean = DOMPurify.sanitize(dirty, {RETURN_TRUSTED_TYPE: true}); // will return a TrustedHTML object instead of a string if possible
293
287
 
294
288
  // use a provided Trusted Types policy
295
- var clean = DOMPurify.sanitize(dirty, {
289
+ const clean = DOMPurify.sanitize(dirty, {
296
290
  // supplied policy must define createHTML and createScriptURL
297
291
  TRUSTED_TYPES_POLICY: trustedTypes.createPolicy({
298
292
  createHTML(s) { return s},
299
293
  createScriptURL(s) { return s},
300
294
  }
301
295
  });
302
-
303
- /**
304
- * Influence how we sanitize
305
- */
296
+ ```
297
+ ### Influence how we sanitize
298
+ ```js
306
299
  // return entire document including <html> tags (default is false)
307
- var clean = DOMPurify.sanitize(dirty, {WHOLE_DOCUMENT: true});
300
+ const clean = DOMPurify.sanitize(dirty, {WHOLE_DOCUMENT: true});
308
301
 
309
302
  // disable DOM Clobbering protection on output (default is true, handle with care, minor XSS risks here)
310
- var clean = DOMPurify.sanitize(dirty, {SANITIZE_DOM: false});
303
+ const clean = DOMPurify.sanitize(dirty, {SANITIZE_DOM: false});
311
304
 
312
305
  // enforce strict DOM Clobbering protection via namespace isolation (default is false)
313
306
  // when enabled, isolates the namespace of named properties (i.e., `id` and `name` attributes)
314
307
  // from JS variables by prefixing them with the string `user-content-`
315
- var clean = DOMPurify.sanitize(dirty, {SANITIZE_NAMED_PROPS: true});
308
+ const clean = DOMPurify.sanitize(dirty, {SANITIZE_NAMED_PROPS: true});
316
309
 
317
310
  // keep an element's content when the element is removed (default is true)
318
- var clean = DOMPurify.sanitize(dirty, {KEEP_CONTENT: false});
311
+ const clean = DOMPurify.sanitize(dirty, {KEEP_CONTENT: false});
319
312
 
320
313
  // glue elements like style, script or others to document.body and prevent unintuitive browser behavior in several edge-cases (default is false)
321
- var clean = DOMPurify.sanitize(dirty, {FORCE_BODY: true});
314
+ const clean = DOMPurify.sanitize(dirty, {FORCE_BODY: true});
322
315
 
323
316
  // remove all <a> elements under <p> elements that are removed
324
- var clean = DOMPurify.sanitize(dirty, {FORBID_CONTENTS: ['a'], FORBID_TAGS: ['p']});
317
+ const clean = DOMPurify.sanitize(dirty, {FORBID_CONTENTS: ['a'], FORBID_TAGS: ['p']});
325
318
 
326
319
  // change the parser type so sanitized data is treated as XML and not as HTML, which is the default
327
- var clean = DOMPurify.sanitize(dirty, {PARSER_MEDIA_TYPE: 'application/xhtml+xml'});
328
-
329
- /**
330
- * Influence where we sanitize
331
- */
320
+ const clean = DOMPurify.sanitize(dirty, {PARSER_MEDIA_TYPE: 'application/xhtml+xml'});
321
+ ```
322
+ ### Influence where we sanitize
323
+ ```js
332
324
  // use the IN_PLACE mode to sanitize a node "in place", which is much faster depending on how you use DOMPurify
333
- var dirty = document.createElement('a');
325
+ const dirty = document.createElement('a');
334
326
  dirty.setAttribute('href', 'javascript:alert(1)');
335
- var clean = DOMPurify.sanitize(dirty, {IN_PLACE: true}); // see https://github.com/cure53/DOMPurify/issues/288 for more info
327
+
328
+ const clean = DOMPurify.sanitize(dirty, {IN_PLACE: true}); // see https://github.com/cure53/DOMPurify/issues/288 for more info
336
329
  ```
337
330
 
338
331
  There is even [more examples here](https://github.com/cure53/DOMPurify/tree/main/demos#what-is-this), showing how you can run, customize and configure DOMPurify to fit your needs.
@@ -416,7 +409,7 @@ Feature releases will not be announced to this list.
416
409
 
417
410
  Many people helped and help DOMPurify become what it is and need to be acknowledged here!
418
411
 
419
- [JGraph 💸](https://github.com/jgraph), [GitHub 💸](https://github.com/github), [CynegeticIO 💸](https://github.com/CynegeticIO), [Sentry 💸](https://github.com/getsentry), [jarrodldavis 💸](https://github.com/jarrodldavis), [kevin_mizu](https://twitter.com/kevin_mizu), [GrantGryczan](https://github.com/GrantGryczan), [Lowdefy 💸](https://twitter.com/lowdefy), [granlem ](https://twitter.com/MaximeVeit), [oreoshake ](https://github.com/oreoshake), [dcramer 💸](https://github.com/dcramer),[tdeekens ❤️](https://github.com/tdeekens), [peernohell ❤️](https://github.com/peernohell), [is2ei](https://github.com/is2ei), [SoheilKhodayari](https://github.com/SoheilKhodayari), [franktopel](https://github.com/franktopel), [NateScarlet](https://github.com/NateScarlet), [neilj](https://github.com/neilj), [fhemberger](https://github.com/fhemberger), [Joris-van-der-Wel](https://github.com/Joris-van-der-Wel), [ydaniv](https://github.com/ydaniv), [terjanq](https://twitter.com/terjanq), [filedescriptor](https://github.com/filedescriptor), [ConradIrwin](https://github.com/ConradIrwin), [gibson042](https://github.com/gibson042), [choumx](https://github.com/choumx), [0xSobky](https://github.com/0xSobky), [styfle](https://github.com/styfle), [koto](https://github.com/koto), [tlau88](https://github.com/tlau88), [strugee](https://github.com/strugee), [oparoz](https://github.com/oparoz), [mathiasbynens](https://github.com/mathiasbynens), [edg2s](https://github.com/edg2s), [dnkolegov](https://github.com/dnkolegov), [dhardtke](https://github.com/dhardtke), [wirehead](https://github.com/wirehead), [thorn0](https://github.com/thorn0), [styu](https://github.com/styu), [mozfreddyb](https://github.com/mozfreddyb), [mikesamuel](https://github.com/mikesamuel), [jorangreef](https://github.com/jorangreef), [jimmyhchan](https://github.com/jimmyhchan), [jameydeorio](https://github.com/jameydeorio), [jameskraus](https://github.com/jameskraus), [hyderali](https://github.com/hyderali), [hansottowirtz](https://github.com/hansottowirtz), [hackvertor](https://github.com/hackvertor), [freddyb](https://github.com/freddyb), [flavorjones](https://github.com/flavorjones), [djfarrelly](https://github.com/djfarrelly), [devd](https://github.com/devd), [camerondunford](https://github.com/camerondunford), [buu700](https://github.com/buu700), [buildog](https://github.com/buildog), [alabiaga](https://github.com/alabiaga), [Vector919](https://github.com/Vector919), [Robbert](https://github.com/Robbert), [GreLI](https://github.com/GreLI), [FuzzySockets](https://github.com/FuzzySockets), [ArtemBernatskyy](https://github.com/ArtemBernatskyy), [@garethheyes](https://twitter.com/garethheyes), [@shafigullin](https://twitter.com/shafigullin), [@mmrupp](https://twitter.com/mmrupp), [@irsdl](https://twitter.com/irsdl),[ShikariSenpai](https://github.com/ShikariSenpai), [ansjdnakjdnajkd](https://github.com/ansjdnakjdnajkd), [@asutherland](https://twitter.com/asutherland), [@mathias](https://twitter.com/mathias), [@cgvwzq](https://twitter.com/cgvwzq), [@robbertatwork](https://twitter.com/robbertatwork), [@giutro](https://twitter.com/giutro), [@CmdEngineer\_](https://twitter.com/CmdEngineer_), [@avr4mit](https://twitter.com/avr4mit) and especially [@securitymb ❤️](https://twitter.com/securitymb) & [@masatokinugawa ❤️](https://twitter.com/masatokinugawa)
412
+ [dcramer 💸](https://github.com/dcramer), [JGraph 💸](https://github.com/jgraph), [baekilda 💸](https://github.com/baekilda), [Healthchecks 💸](https://github.com/healthchecks), [Sentry 💸](https://github.com/getsentry), [jarrodldavis 💸](https://github.com/jarrodldavis), [CynegeticIO](https://github.com/CynegeticIO), [ssi02014 ❤️](https://github.com/ssi02014), [kevin_mizu](https://twitter.com/kevin_mizu), [GrantGryczan](https://github.com/GrantGryczan), [Lowdefy](https://twitter.com/lowdefy), [granlem](https://twitter.com/MaximeVeit), [oreoshake](https://github.com/oreoshake), [tdeekens ❤️](https://github.com/tdeekens), [peernohell ❤️](https://github.com/peernohell), [is2ei](https://github.com/is2ei), [SoheilKhodayari](https://github.com/SoheilKhodayari), [franktopel](https://github.com/franktopel), [NateScarlet](https://github.com/NateScarlet), [neilj](https://github.com/neilj), [fhemberger](https://github.com/fhemberger), [Joris-van-der-Wel](https://github.com/Joris-van-der-Wel), [ydaniv](https://github.com/ydaniv), [terjanq](https://twitter.com/terjanq), [filedescriptor](https://github.com/filedescriptor), [ConradIrwin](https://github.com/ConradIrwin), [gibson042](https://github.com/gibson042), [choumx](https://github.com/choumx), [0xSobky](https://github.com/0xSobky), [styfle](https://github.com/styfle), [koto](https://github.com/koto), [tlau88](https://github.com/tlau88), [strugee](https://github.com/strugee), [oparoz](https://github.com/oparoz), [mathiasbynens](https://github.com/mathiasbynens), [edg2s](https://github.com/edg2s), [dnkolegov](https://github.com/dnkolegov), [dhardtke](https://github.com/dhardtke), [wirehead](https://github.com/wirehead), [thorn0](https://github.com/thorn0), [styu](https://github.com/styu), [mozfreddyb](https://github.com/mozfreddyb), [mikesamuel](https://github.com/mikesamuel), [jorangreef](https://github.com/jorangreef), [jimmyhchan](https://github.com/jimmyhchan), [jameydeorio](https://github.com/jameydeorio), [jameskraus](https://github.com/jameskraus), [hyderali](https://github.com/hyderali), [hansottowirtz](https://github.com/hansottowirtz), [hackvertor](https://github.com/hackvertor), [freddyb](https://github.com/freddyb), [flavorjones](https://github.com/flavorjones), [djfarrelly](https://github.com/djfarrelly), [devd](https://github.com/devd), [camerondunford](https://github.com/camerondunford), [buu700](https://github.com/buu700), [buildog](https://github.com/buildog), [alabiaga](https://github.com/alabiaga), [Vector919](https://github.com/Vector919), [Robbert](https://github.com/Robbert), [GreLI](https://github.com/GreLI), [FuzzySockets](https://github.com/FuzzySockets), [ArtemBernatskyy](https://github.com/ArtemBernatskyy), [@garethheyes](https://twitter.com/garethheyes), [@shafigullin](https://twitter.com/shafigullin), [@mmrupp](https://twitter.com/mmrupp), [@irsdl](https://twitter.com/irsdl),[ShikariSenpai](https://github.com/ShikariSenpai), [ansjdnakjdnajkd](https://github.com/ansjdnakjdnajkd), [@asutherland](https://twitter.com/asutherland), [@mathias](https://twitter.com/mathias), [@cgvwzq](https://twitter.com/cgvwzq), [@robbertatwork](https://twitter.com/robbertatwork), [@giutro](https://twitter.com/giutro), [@CmdEngineer\_](https://twitter.com/CmdEngineer_), [@avr4mit](https://twitter.com/avr4mit) and especially [@securitymb ❤️](https://twitter.com/securitymb) & [@masatokinugawa ❤️](https://twitter.com/masatokinugawa)
420
413
 
421
414
  ## Testing powered by
422
415