From 4c5428364231ee28c5bb77a813f4981bfa1a5b2b Mon Sep 17 00:00:00 2001
From: "Edward Z. Yang"
img
tags, which HTML Purifier allows by default, can be
+dangerous. Be distrustful of anything that tells a browser to load content
+from another website automatically.
Luckily for us, however, whitelisting saves the day. Sure, letting users include any old random flash file could be dangerous, but if it's @@ -147,13 +147,18 @@ the user's operating system/browser. You need to either cap it by limiting the amount of digits allowed in the regex or using a callback to check the number.
-By allowing this code onto our website, we are trusting that YouTube has tech-savvy enough people not to allow their users to inject malicious -code into the Flash files. An exploit on YouTube means an exploit on your -site, and when you start allowing shadier sites, remember that trust -is important.
+code into the Flash files. An exploit on YouTube means an exploit on your +site. Even though YouTube is run by the reputable Google, it +doesn't +mean they are +invulnerable. +You're putting a certain measure of the job on an external provider (just as +you have by entrusting your user input to HTML Purifier), and +it is important that you are cognizant of the risk.