Skip to main content
ESLint Interlace
Plugin: react-featuresRules

no-unescaped-entities

no-unescaped-entities rule

Keywords: React, JSX, entities, quotes, apostrophe, ESLint rule, HTML, LLM-optimized

Detect unescaped HTML entities in JSX. This rule is part of eslint-plugin-react-features.

Quick Summary

AspectDetails
SeverityError (syntax)
Auto-Fix✅ Yes (escapes entities)
CategoryReact
ESLint MCP✅ Optimized for ESLint MCP integration
Best ForAll React/JSX projects

Rule Details

Characters like >, ", ', } have special meaning in JSX and must be escaped.

Why This Matters

IssueImpactSolution
⚠️ Syntax errorsJSX parsing failsUse HTML entities
📖 ReadabilityAmbiguous charactersExplicit escaping
🐛 Silent failuresWrong outputProper encoding

Examples

❌ Incorrect

// Unescaped special characters
<div>5 > 3</div>
<div>It's working</div>
<div>Use "quotes"</div>
<div>Value: {value}</div>  // Unescaped } if not expression

✅ Correct

<div>Hello World</div>

Entity Reference

CharacterEntityAlternative
>&gt;{'>'} or &#62;
<&lt;{'<'} or &#60;
"&quot;{'"'} or &#34;
'&apos;{"'"} or &#39;
}&#125;{'}'}
{&#123;{'{'}

Configuration Examples

Basic Usage

{
  rules: {
    'react-features/no-unescaped-entities': 'error'
  }
}

Further Reading

Known False Negatives

The following patterns are not detected due to static analysis limitations:

Dynamic Variable References

Why: Static analysis cannot trace values stored in variables or passed through function parameters.

// ❌ NOT DETECTED - Prop from variable
const propValue = computedValue;
<Component prop={propValue} /> // Computation not analyzed

Mitigation: Implement runtime validation and review code manually. Consider using TypeScript branded types for validated inputs.

Wrapped or Aliased Functions

Why: Custom wrapper functions or aliased methods are not recognized by the rule.

// ❌ NOT DETECTED - Custom wrapper
function myWrapper(data) {
  return internalApi(data); // Wrapper not analyzed
}
myWrapper(unsafeInput);

Mitigation: Apply this rule's principles to wrapper function implementations. Avoid aliasing security-sensitive functions.

Imported Values

Why: When values come from imports, the rule cannot analyze their origin or construction.

// ❌ NOT DETECTED - Value from import
import { getValue } from './helpers';
processValue(getValue()); // Cross-file not tracked

Mitigation: Ensure imported values follow the same constraints. Use TypeScript for type safety.