Jam.py documentation


To prevent Cross Site Scripting (XSS) attacks, Jam.py sanitizese field values displayed in the table columns.

For example, if field contains the following text:

"<span style='color: red'>USA</span>"

when unsanitized it will be displayed in the table column as follows:


When the field text sanitized, it is transformed to the following:

"&lt;span style='color: red'&gt;USA&lt;/span&gt;"

as you can see symbols ‘<’ and ‘>’ are replaced with ‘&lt;’ and ‘&gt;’ and the table column will be displayed this way:


There are two ways to prevent sanitizing.

First is to set Do not sanitize attribute in the Interface tab in the Field Editor Dialog


Second is to write the on_field_get_html event handler. If the this event handler returns a value it is not sanitized.