| 123456789101112131415161718192021222324252627282930313233343536373839 | // Copyright (c) Microsoft Corporation.// Licensed under the MIT License./** * @fileoverview Rule to disallow bypassing Angular's built-in sanitizer * @author Antonios Katopodis */"use strict";//------------------------------------------------------------------------------// Rule Definition//------------------------------------------------------------------------------module.exports = {    meta: {        type: "suggestion",        fixable: "code",        schema: [],        docs: {            category: "Security",            description: "Calls to bypassSecurityTrustHtml, bypassSecurityTrustScript and similar methods bypass DomSanitizer in Angular and need to be reviewed.",            url: "https://github.com/microsoft/eslint-plugin-sdl/blob/master/docs/rules/no-angular-bypass-sanitizer.md"        },        messages: {            noBypass: "Do not bypass Angular's built-in sanitizer"        }    },    create: function(context) {        return {            "CallExpression[arguments!=''][callee.property.name=/bypassSecurityTrust(Html|ResourceUrl|Script|Style|Url)/]"(node) {                context.report(                {                    node: node,                    messageId: "noBypass"                });            }        };    }};
 |