From 2df057fb6599e5c60f04afe0dd06604412d0448b Mon Sep 17 00:00:00 2001 From: Michael Snoyman Date: Thu, 28 Jun 2018 19:04:03 +0300 Subject: [PATCH] Badges --- README.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/README.md b/README.md index 68c170a..06ca2d5 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,8 @@ # Summary +[![Build Status](https://travis-ci.org/yesodweb/haskell-xss-sanitize.svg?branch=master)](https://travis-ci.org/yesodweb/haskell-xss-sanitize) +[![Build status](https://ci.appveyor.com/api/projects/status/1i4xx9qi53r58tsh/branch/master?svg=true)](https://ci.appveyor.com/project/snoyberg/haskell-xss-sanitize/branch/master) + xss-sanitize allows you to accept html from untrusted sources by first filtering it through a white list. The white list filtering is fairly comprehensive, including support for css in style attributes, but there are limitations enumerated below.