in the FAQ for the Anti-XSS feature, it says:
https://noscript.net/faq#qa4_2Cross-site requests from a trusted site to a different trusted site are checked through the InjectionChecker engine, which is more accurate and sanitizes only requests which contain conspicuous fragments of HTML or syntactically valid JavaScript.
What exactly determines if a string is conspicous or not? Is there a certain threshold for number of characters and/or number of html tags? Any chance that spaces play a role?
Because I have a string consisting of alphanumeric characters, spaces and html elements (<br />, <b>, and <i>) and when I do a POST request from Site A to Site B where this string is sent, NoScript's XSS protection steps in:
I woul like to know how I should tweak the string so that it passes. I tried using less charachters and less html elements, but without luck.[NoScript InjectionChecker] JavaScript Injection in ##[[My string...]]
[NoScript XSS] Ein verdächtiger Upload zu [[Site B...]] von [[Site A...]] wurde bereinigt und in eine GET-Anfrage (nur Download) umgewandelt.
I use NoScript 2.9.0.11.
Any help would be appreciated, thanks.
As a test, can you submit the form using GET and check the Browser Console (Ctrl-Shift-J) see how NoScript sanitises the URL?