Expand description
Central JavaScript handling policy for PDF/XFA hardening paths.
Enums§
- Java
Script Entry Point - JavaScriptEntryPoint.
- Java
Script Policy - JavaScript may be parsed and inspected so hardening code can locate and remove active content, but this crate must never execute document-supplied JavaScript. PDF/XFA inputs are untrusted and JavaScript actions can reach viewer APIs, network/file operations, and mutable form state. Keeping parse, execution, and flatten behavior as explicit policy values prevents hidden no-op fallbacks from becoming accidental execution paths in future work.
Constants§
- ALLOW_
PARSE - ALLOW_PARSE.
- DENY_
EXECUTION - DENY_EXECUTION.
- STRIP_
ON_ FLATTEN - STRIP_ON_FLATTEN.
Functions§
- catalog_
has_ javascript_ open_ action - catalog_has_javascript_open_action.
- dict_
has_ javascript_ additional_ actions - dict_has_javascript_additional_actions.
- dict_
has_ javascript_ field_ action - dict_has_javascript_field_action.
- execution_
denied_ message - execution_denied_message.
- execution_
policy - execution_policy.
- flatten_
policy - flatten_policy.
- is_
javascript_ action_ dict - is_javascript_action_dict.
- parse_
policy - parse_policy.
- reject_
execution - reject_execution.
- strip_
javascript_ for_ flatten - Strip JavaScript-bearing PDF actions from XFA flattened output.
- template_
mentions_ javascript - template_mentions_javascript.