#xss #sanitizer #filter #security #purify

bin+lib svg-hush

Strip scripting and other abusable features from SVG files

2 releases

Uses new Rust 2021

0.9.1 Sep 22, 2022
0.9.0 Jul 27, 2022

#2 in #xss

Download history 31/week @ 2022-07-27 2/week @ 2022-08-03 8/week @ 2022-08-10 47/week @ 2022-08-17 23/week @ 2022-08-24 191/week @ 2022-08-31 134/week @ 2022-09-07 110/week @ 2022-09-14 154/week @ 2022-09-21

596 downloads per month

Apache-2.0 OR MIT

808 lines


The goal of this tool is to make arbitrary SVG files as benign and safe to serve as images in other common Web file formats. SVG files aren't just images, they're documents with full access to all HTML and JavaScript features. This tool filters SVG files to remove use of any potentially risky features.

  • Removes scripting. Prevents SVG files from being used for cross-site scripting attacks. Although browsers don't allow scripts in <img>, they do allow scripting when SVG files are opened directly as a top-level document.

  • Removes hyperlinks to other documents. Makes SVG files less attractive for SEO spam and phishing.

  • Removes references to cross-origin resources. Stops 3rd parties from tracking who is viewing the image.

This tool removes any elements and attributes that aren't in its allowlist and filters all URLs to be same-origin only (paths without a host name). It is likely to break some SVG images. Please file a bug when you find an image that is filtered too harshly!

This tool might make SVG files smaller by removing unnecessary junk from them, but it's not meant to be an SVG optimizer. It should be safe to optimize filtered SVG images with other tools.

Sanitization vs CSP

Regardless of this filtering, it's best to serve SVG images with a restrictive Content-Security-Policy. This tool is a defense-in-depth for cases where the CSP header may be unsupported, lost, or bypassed (e.g. due to server/CMS misconfiguration or a ServiceWorker that doesn't forward headers).

Early release warning

This is an early version of this tool. There could be some SVG features or syntax that it fails to filter out. Please try to break it, and report any holes you find!

Known limitations

  • Only UTF-8 encoding is supported.
  • DOCTYPEs with custom entities are not supported.
  • SVG-in-HTML dialect is not supported. SVG documents must be well-formed XML and use the SVG namespace.


~69K SLoC