To prevent XSS/CSRF exploits in MSIE8 and newer, itâs often best to close as many attack vectors as possible. An easy one to implement is an HTTP Header to prevent MSIE from âsniffingâ the content to change it when incorrect. Example: we would not want an HTML page intentionally served with âtext/plainâ to be rendered as HTML. X-Content-Type-Options: nosniff Content-Type: text/plain This could be
{{#tags}}- {{label}}
{{/tags}}