When autoescaping is enabled, Jinja2 will filter input strings to escape any HTML submitted via template variables. Without escaping HTML input the application becomes vulnerable to Cross Site Scripting (XSS) attacks. Prevent potential attacks in your project with Codeac.
Join developers who trust Codeac to improve the quality of their code.
Hey there, we’re glad seeing you chose Codeac to fight with the technical debt.
Before performing your first analysis we need to register a webhook for your repositories. This requires write permissions to your vcs which are used only for this case.
We do not perform any changes to your code.