Skip to content

noBlankTarget

Disallow target="_blank" attribute without rel="noopener".

When creating an anchor a element, there are times when its link has to be opened in a new browser tab via the target="_blank" attribute. This attribute has to be paired with rel="noopener" or you may run into security issues.

See to the noopener documentation.

<a href='http://external.link' target='_blank'>child</a>
code-block.jsx:1:32 lint/security/noBlankTarget  FIXABLE  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Avoid using target=“_blank” without rel=“noopener” or rel=“noreferrer”.

> 1 │ <a href=‘http://external.link’ target=’_blank’>child</a>
^^^^^^^^^^^^^^^
2 │

Opening external links in new tabs without rel=“noopener” is a security risk. See the explanation for more details.

Safe fix: Add the rel=“noopener” attribute.

1 │ <a·href=‘http://external.link·target=’_blank’·rel=noopener>child</a>
+++++++++++++++
<a href='http://external.link' target='_blank' rel='nofollow'>child</a>
code-block.jsx:1:32 lint/security/noBlankTarget  FIXABLE  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Avoid using target=“_blank” without rel=“noopener” or rel=“noreferrer”.

> 1 │ <a href=‘http://external.link’ target=’_blank’ rel=‘nofollow’>child</a>
^^^^^^^^^^^^^^^
2 │

Opening external links in new tabs without rel=“noopener” is a security risk. See the explanation for more details.

Safe fix: Add the “noopener” to the existing attribute.

1 - <a·href=http://external.link·target=_blank·rel=nofollow>child</a>
1+ <a·href=http://external.link·target=_blank·rel=noopener·nofollow>child</a>
2 2

<a {...props} href='http://external.link' target='_blank' rel='nofollow'>child</a>
code-block.jsx:1:43 lint/security/noBlankTarget  FIXABLE  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Avoid using target=“_blank” without rel=“noopener” or rel=“noreferrer”.

> 1 │ <a {…props} href=‘http://external.link’ target=’_blank’ rel=‘nofollow’>child</a>
^^^^^^^^^^^^^^^
2 │

Opening external links in new tabs without rel=“noopener” is a security risk. See the explanation for more details.

Safe fix: Add the “noopener” to the existing attribute.

1 - <a·{...props}·href=http://external.link·target=_blank·rel=nofollow>child</a>
1+ <a·{...props}·href=http://external.link·target=_blank·rel=noopener·nofollow>child</a>
2 2

<a href='http://external.link' rel='noopener' target='_blank'>child</a>
<a href='http://external.link' rel='noreferrer' target='_blank'>child</a>
// The rule accepts elements with spread props, because the required
// attribute may be injected dynamically:
<a href='http://external.link' target='_blank' {...props}>child</a>

By default, noBlankTarget accepts both rel="noopener" and rel="noreferrer" with links that have target="_blank". This is because the latter implies the former, so either one is sufficient to mitigate the security risk.

However, allowing rel="noreferrer" may still be undesirable, because it can break tracking, which may be an undesirable side-effect. As such, you can set allowNoReferrer: false to only accept rel="noopener".

See to the noreferrer documentation.

{
"options": {
"allowNoReferrer": false
}
}
<a href='http://external.link' rel='noreferrer' target='_blank'>child</a>

Default: true

The option allowDomains allows specific domains to use target="_blank" without rel="noopener". In the following configuration, it’s allowed to use the domains https://example.com and example.org:

{
"options": {
"allowDomains": ["https://example.com", "example.org"]
}
}
<>
<a target='_blank' testme href='https://example.com'></a>
<a target='_blank' href='example.org'></a>
</>

The diagnostic is applied to all domains not in the allow list:

{
"options": {
"allowDomains": ["https://example.com"]
}
}
<>
<a target='_blank' testme href='https://example.com'></a>
<a target='_blank' href='example.org'></a>
</>
code-block.jsx:2:6 lint/security/noBlankTarget  FIXABLE  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Avoid using target=“_blank” without rel=“noopener” or rel=“noreferrer”.

1 │ <>
> 2 │ <a target=’_blank’ testme href=‘https://example.com’&gt;&lt;/a>
^^^^^^^^^^^^^^^
3 │ <a target=’_blank’ href=‘example.org’></a>
4 │ </>

Opening external links in new tabs without rel=“noopener” is a security risk. See the explanation for more details.

Safe fix: Add the rel=“noopener” attribute.

2 │ ··<a·target=’_blank’·testme·href=‘https://example.com·rel=noopener></a>
+++++++++++++++
code-block.jsx:3:6 lint/security/noBlankTarget FIXABLE ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Avoid using target=“_blank” without rel=“noopener” or rel=“noreferrer”.

1 │ <>
2 │ <a target=’_blank’ testme href=‘https://example.com’&gt;&lt;/a>
> 3 │ <a target=’_blank’ href=‘example.org’></a>
^^^^^^^^^^^^^^^
4 │ </>
5 │

Opening external links in new tabs without rel=“noopener” is a security risk. See the explanation for more details.

Safe fix: Add the rel=“noopener” attribute.

3 │ ··<a·target=’_blank’·href=‘example.org’·rel=noopener></a>
+++++++++++++++

Biome doesn’t check if the list contains valid URLs.

biome.json
{
"linter": {
"rules": {
"security": {
"noBlankTarget": "error"
}
}
}
}