Listen "Understanding how Stringable works inside Blade views"
Episode Synopsis
Joel and Aaron dig into Laravel’s `Stringable` class and uncover how it can silently skip Blade’s automatic HTML escaping. They explain why that’s both a convenient feature and a potential security pitfall if user input isn’t properly sanitized. You’ll hear practical ways to keep your views safe without losing the API’s fluency.(00:00) - Stringable can sidestep Blade escaping
(03:45) - Dangers of outputting unsanitized HTML
(05:45) - Defensive strategies for safe rendering
(08:45) - Silly bit
Sign up for a short, but useful, Laravel tip each day in our newsletter
More episodes of the podcast No Compromises
Why I changed my mind about down migrations
03/01/2026
Why senior developers feel wrong more often
20/12/2025
Should you ever hand-format code?
06/12/2025
Discussing different ways to model data
22/11/2025
Read outside tech to expand your horizons
08/11/2025
Should you use DTOs in Laravel?
27/09/2025
Sunsetting a company app without loose ends
13/09/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.