Sanitizing¶
To prevent Cross Site Scripting (XSS) attacks, Jam.py sanitizes field values displayed in the table columns.
For example, if field contains the following text:
"<span style='color: red'>USA</span>"
when un-sanitized, it will be displayed in the table column as follows:

When the field text is sanitized, it is transformed to the following:
"<span style='color: red'>USA</span>"
as you can see symbols ‘<’ and ‘>’ are replaced with ‘<’ and ‘>’ and the table column will be displayed this way:

There are two ways to prevent sanitizing.
First is to set Do not sanitize attribute in the Interface tab in the Field Editor Dialog

Second is to write the on_field_get_html event handler. If the this event handler returns a value it is not sanitized.