diff --git a/aio/content/guide/security.en.md b/aio/content/guide/security.en.md new file mode 100644 index 000000000000..2dd439d7d27f --- /dev/null +++ b/aio/content/guide/security.en.md @@ -0,0 +1,322 @@ +# Security + +This page describes Angular's built-in +protections against common web-application vulnerabilities and attacks such as cross-site +scripting attacks. It doesn't cover application-level security, such as authentication (_Who is +this user?_) and authorization (_What can this user do?_). + +For more information about the attacks and mitigations described below, see [OWASP Guide Project](https://www.owasp.org/index.php/Category:OWASP_Guide_Project). + +You can run the in Stackblitz and download the code from there. + + + +

+ Reporting vulnerabilities +

+ + + +To report vulnerabilities in Angular itself, email us at [security@angular.io](mailto:security@angular.io). + +For more information about how Google handles security issues, see [Google's security +philosophy](https://www.google.com/about/appsecurity/). + + + +

+ Best practices +

+ + + +* **Keep current with the latest Angular library releases.** +We regularly update the Angular libraries, and these updates may fix security defects discovered in +previous versions. Check the Angular [change +log](https://github.com/angular/angular/blob/master/CHANGELOG.md) for security-related updates. + +* **Don't modify your copy of Angular.** +Private, customized versions of Angular tend to fall behind the current version and may not include +important security fixes and enhancements. Instead, share your Angular improvements with the +community and make a pull request. + +* **Avoid Angular APIs marked in the documentation as “_Security Risk_.”** +For more information, see the [Trusting safe values](guide/security#bypass-security-apis) section of this page. + + + +

+ Preventing cross-site scripting (XSS) +

+ + + +[Cross-site scripting (XSS)](https://en.wikipedia.org/wiki/Cross-site_scripting) enables attackers +to inject malicious code into web pages. Such code can then, for example, steal user data (in +particular, login data) or perform actions to impersonate the user. This is one of the most +common attacks on the web. + +To block XSS attacks, you must prevent malicious code from entering the DOM (Document Object Model). For example, if +attackers can trick you into inserting a `