eh
sandbox
Created at 2026-02-10 UTC [Last edited at: 2026-02-10 12:15:47 UTC]
- a point
- a
- a
- a
- a
- a
test
wtsmncc
I allow user generated html elements inline but they are heavily sanitized as will be seen below
this is to prevent the user of injecting malicious content
the text below contains illegal inputs which have been filtered out, however, legitimate content is supposed to remain.
this is supposed to be an XSS injection using the illegal script tag
<!-- removed script tag -->
this is supposed to trigger some malicious javascript while being in a condoned tag
<!-- removed dangerous link -->click me</a>
click me
to explain how elements work they are essential even with html input being allowed due their compactness and readability but also because they contain javascript actions which the user cannot manipulate, & are single line manipulators, % is for those aimed at multiline modifications, these can't be put in tables due their logic which is their main distinguishing feature.
@ is for embedding is for the input of files or external content or more advanced javascript functions that do not serve a formal purpose.
| 名称 |
造物神覇王 |
|---|---|
| 成立 | the translation is not important but this is a table with coloured text, ruby notation and an image all in one, they are rendered in sequence avoiding any errors |
This is centered text.
This paragraph should be indented.
this done by a single tag called "&align"
Confidential!
Authorisation required
this is the revealed content
closed
open
accordion is open
This is keyboard text
This is code
his accordion starts closed.
nfinite accordions
----
deathmatch
Result
inline CSS
<style>
.highlight {
color: yellow;
background-color: #ff5733;
padding: 5px;
font-weight: bold;
border-radius: 4px;
}
.custom-header {
font-size: 36px;
color: #4CAF50;
}
</style>
HAPPY NEW YEAR!
line
---- thick line
custom line
very interesting behavior
Tags: none