import debug from './debug'; // If this list catches things that are not necessarily forbidden we're ok with // a little bit of approximation as long as we do catch the ones that we have to. // We need to be quite aggressive with how we filter candiate pages as failing // to protect our users' privacy puts us in breach of our own TOS and our // retargeting partners' TOS. We also see personally identifiable information in // unexpected places like email addresses in users' posts URLs and titles for // various (usually accidental) reasons. We also pass PII in URLs like // `wordpress.com/jetpack/connect` and `wordpress.com/error-report`. const forbiddenPiiPatterns = [ '@', 'email=', 'email_address=', 'first=', 'last=', 'first-name=', 'last-name=', 'address-1=', 'phone=', ]; const forbiddenPiiPatternsEnc = forbiddenPiiPatterns.map( ( pattern ) => { return encodeURIComponent( pattern ); } ); /** * Whether the current URL can potentially contain personally identifiable info. * @returns {boolean} true if the current URL can potentially contain personally identifiable info. */ export default function isPiiUrl() { const href = document.location.href; const match = ( pattern ) => href.indexOf( pattern ) !== -1; const result = forbiddenPiiPatterns.some( match ) || forbiddenPiiPatternsEnc.some( match ); debug( `Is PII URL: ${ result }` ); return result; }