http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4559604/
To address this vulnerability, we used a JavaScript sanitizing library > called Caja [38 <http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4559604/#B38>], > which allows third-party scripts to be executed by the same JavaScript > runtime environment as the framework code, but in sandbox mode, with > restrictions defined within the host script. -- Cheers, --MarkM -- --- You received this message because you are subscribed to the Google Groups "Google Caja Discuss" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
