From e1f2a8f10fb4c449d72355ee1bdaa464c7c3740d Mon Sep 17 00:00:00 2001 From: Hamish Willee Date: Fri, 20 Sep 2024 11:16:33 +1000 Subject: [PATCH] Apply suggestions from code review Co-authored-by: wbamberg --- files/en-us/web/api/cspviolationreportbody/blockedurl/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/files/en-us/web/api/cspviolationreportbody/blockedurl/index.md b/files/en-us/web/api/cspviolationreportbody/blockedurl/index.md index 4bf3b49ccc5bade..b67cbeceed4262a 100644 --- a/files/en-us/web/api/cspviolationreportbody/blockedurl/index.md +++ b/files/en-us/web/api/cspviolationreportbody/blockedurl/index.md @@ -30,7 +30,7 @@ If the value is not the URL of a resource, it must be one of the following strin For example, a {{domxref("TrustedTypePolicy")}} was created using {{domxref("TrustedTypePolicyFactory/createPolicy", "window.trustedTypes.createPolicy()")}} with a name that wasn't listed in the `trusted-types` directive, or the new policy did not provide adequate sanitization. - `trusted-types-sink` - : A resource that violated the [`require-trusted-types-for`](/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/trusted-types) CSP directive. - For example, the directive was set to `script` but the a sink for sanitized data, such as the {{domxref("Element.innerHTML")}} property did not use a {{domxref("TrustedTypePolicy")}} to sanitize the data before passing it to `innerHTML`. + For example, the directive was set to `script` but the document did not use a {{domxref("TrustedTypePolicy")}} to sanitize data before passing it to a sink such as {{domxref("Element.innerHTML")}}. ## Examples