From a94b2bc589a3adcae3a91397df759e803f05d014 Mon Sep 17 00:00:00 2001 From: Emilis <39080797+bonno42h@users.noreply.github.com> Date: Sun, 23 Feb 2020 16:47:30 +0200 Subject: [PATCH] docs: fix typo (#518) __dangerouslyDisableSantizers -> __dangerouslyDisableSanitizers --- docs/api/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/api/README.md b/docs/api/README.md index 7c91d68..88e3f64 100644 --- a/docs/api/README.md +++ b/docs/api/README.md @@ -503,7 +503,7 @@ If you need to disable sanitation, please always use [__dangerouslyDisableSaniti By disabling sanitization, you are opening potential vectors for attacks such as SQL injection & Cross-Site Scripting (XSS). Be very careful to not compromise your application. ::: -By default, `vue-meta` sanitizes HTML entities in _every_ property. You can disable this behaviour on a per-property basis using `__dangerouslyDisableSantizers`. Just pass it a list of properties you want sanitization to be disabled on: +By default, `vue-meta` sanitizes HTML entities in _every_ property. You can disable this behaviour on a per-property basis using `__dangerouslyDisableSanitizers`. Just pass it a list of properties you want sanitization to be disabled on: ```js {