Script Attack Protection: Whitelisted Custom Code Elements and Attributes

The Script Attack Protection setting prevents the storage and execution of specific custom code in record values and views that are not whitelisted (see list below). The locations where Script Attack Protection is applied can be found here.

Please contact our support team via the chat widget in the Builder or by submitting this form if you're using a code element that you would like to see included in this whitelist.

Note: Script Attack Protection is not applied to the API & Code section of the app. Additionally, Rich Text views continue to allow scripts when this setting is enabled.

Allowed TagsAllowed AttributesAllowed Self Closing TagsAllowed Schemes
h1a: ['style']imgHTTP
h2a: ['href']behttps
h3a: ['name']hrFTP
h4a: ['target']areamailto
h5h1: [style]basehref
h6h2: [style]basefontsrc
blockquoteh3: [style]inputcite
ph4: [style]link
delh5: [style]meta
ah6: [style]
ulblockquote: [style]
olp: [style]
nldel: [style]
liul: [style]
bol: [style]
Inl: [style]
strongli: [style]
emb: [style]
strikei: [style]
codestrong: [style]
hrem: [style]
bestrike: [style]
divcode: [style]
tablehr: [style]
theadbr: [style]
captiondiv: [style]
tbodytable: [style]
trthead: [style]
theth: [style]
tdtd: [style]
pretr: [style]
iframetbody: [style]
imgcaption: [style]
spanpre: [style]
fontspan: [style]
meterhref
buttonalign
progressiframe
pathcenter
smallimg
variframe: [all attributes]
subimg: [all attributes]
supid
uclass
detailsfont: [face, color, size]
summarybutton: [style, type]
progress: [value, max`]
meter: [value, min, max, optimum]
path: [all attributes]