The sandbox attribute enables an extra set of restrictions for the content in the iframe. Using sandbox attribute is considered a good security practice.
See https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#sandbox
This rule checks all Inferno iframe elements and verifies that there is sandbox attribute and that it's value is valid. In addition to that it also reports cases where attribute contains allow-scripts
and allow-same-origin
at the same time as this combination allows the embedded document to remove the sandbox attribute and bypass the restrictions.
The following patterns are considered warnings:
var Inferno = require('inferno');
var Frame = () => (
<div>
<iframe></iframe>
{Inferno.createElement('iframe')}
</div>
);
The following patterns are not considered warnings:
var Inferno = require('inferno');
var Frame = <iframe sandbox="allow-popups"/>;
var Frame = () => (
<div>
<iframe sandbox="allow-popups"></iframe>
{Inferno.createElement('iframe', { sandbox: "allow-popups" })}
</div>
);
If you don't want to enforce sandbox attribute on iframe elements.