diff --git a/README.md b/README.md
index 2d5181e..982a95f 100644
--- a/README.md
+++ b/README.md
@@ -39,9 +39,9 @@ Where is the white list from?
-----------------------------
Ultimately this is where your security comes from, although I would tend to think that even a basic, incomplete white list would act as a strong deterrent.
-Version 0.1 of the white list is from Pandoc. Probably that list is from an older version of (a wiki page containing a white list)[http://wiki.whatwg.org/wiki/Sanitization_rules]. Having some prior experience editing Wikipedia, I am a little wary of directly using a wiki for a purpose like this, although it does seem to be watched over.
+Version 0.1 of the white list is from Pandoc which is generally stricter than it needs to be but possibly allows unsafe protocols in links.
-Version >= 0.2 uses (the source code of html5lib)[http://code.google.com/p/html5lib/source/browse/python/html5lib/sanitizer.py]. as the source of the white list and my implementation reference. They do reference that wiki page as their source, but hopefully they are careful of when they import it into their code. I would definitely consider working with the maintainers of html5lib, but it doesn't make sense to merge the projects because sanitization is just one aspect of html5lib (They have a parser also)
+Version >= 0.2 uses (the source code of html5lib)[http://code.google.com/p/html5lib/source/browse/python/html5lib/sanitizer.py]. as the source of the white list and my implementation reference. They reference (a wiki page containing a white list)[http://wiki.whatwg.org/wiki/Sanitization_rules], and hopefully they are careful of when they import into their code. Working with the maintainers of html5lib may make sense, but it doesn't make sense to merge the projects because sanitization is just one aspect of html5lib (They have a parser also).
If anyone knows of better sources or thinks a particular tag/attribute/value may be vulnerable, please let me know.
diff --git a/test.hs b/test.hs
index 9c1dbef..44db219 100644
--- a/test.hs
+++ b/test.hs
@@ -1,8 +1,8 @@
import Text.HTML.SanitizeXSS
main = do
- let test = " anchor
"
+ let test = " safeanchor
"
let actual = (sanitizeXSS test)
- let expected = " anchor
"
+ let expected = " safeanchor
"
putStrLn $ "testing: " ++ test
putStrLn $ if actual == expected then "pass" else "failure\n" ++ "\nexpected:" ++ (show expected) ++ "\nactual: " ++ (show actual)
diff --git a/xss-sanitize.cabal b/xss-sanitize.cabal
index 980d3a2..7c8f2e3 100644
--- a/xss-sanitize.cabal
+++ b/xss-sanitize.cabal
@@ -1,5 +1,5 @@
name: xss-sanitize
-version: 0.2.0
+version: 0.2.1
license: BSD3
license-file: LICENSE
author: Greg Weber