diff --git a/crates/oxc_linter/src/rules/react/iframe_missing_sandbox.rs b/crates/oxc_linter/src/rules/react/iframe_missing_sandbox.rs index 0fcd3f4300beb..7d46bfca5aee1 100644 --- a/crates/oxc_linter/src/rules/react/iframe_missing_sandbox.rs +++ b/crates/oxc_linter/src/rules/react/iframe_missing_sandbox.rs @@ -8,6 +8,7 @@ use oxc_macros::declare_oxc_lint; use oxc_span::Span; use phf::{phf_set, Set}; +use crate::ast_util::is_method_call; use crate::utils::{get_prop_value, has_jsx_prop_ignore_case, is_create_element_call}; use crate::{context::LintContext, rule::Rule, AstNode}; @@ -57,12 +58,19 @@ declare_oxc_lint!( /// /// ### Why is this bad? /// - /// The sandbox attribute enables an extra set of restrictions for the content in the iframe. Using sandbox attribute is considered a good security practice. - /// To learn more about sandboxing, see [MDN's documentation on the `sandbox` attribute](https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#sandbox). - + /// The sandbox attribute enables an extra set of restrictions for the + /// content in the iframe. Using sandbox attribute is considered a good + /// security practice. To learn more about sandboxing, see [MDN's + /// documentation on the `sandbox` + /// attribute](https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#sandbox). + /// + /// This rule checks all React `