To justify the use of inline CSS flagged as a security issue in Salesforce:
**Justification Requirements:**
1. **Explain Its Necessity**: Clearly describe why inline CSS is essential for your business logic, such as for dynamic positioning or ensuring proper rendering.
2. **Demonstrate Security**: Show that the component is used in a controlled environment and is not exposed globally, ensuring it does not introduce vulnerabilities.
3. **Submit Documentation**: Provide detailed documentation or submit a case explaining the reasons for its use and confirm that it adheres to Salesforce's security policies.
4. **Explore Alternatives**: Consider using Salesforce Lightning Design System (SLDS) classes or static resources to align with best practices.
**Proper Justification Process:**
To justify the use of inline CSS in self-contained application components for AppExchange Security Review, you need to ensure it adheres to security policies and does not compromise style isolation. Inline CSS should only be used when necessary and must not introduce vulnerabilities. For example, using styles like "overflow: hidden" is acceptable if it doesn't conflict with style isolation or create security risks.
You should provide a clear explanation in your submission, detailing why inline CSS is required and how it complies with security best practices. If applicable, include this justification in the False Positive (FP) document.
**Acceptable Use Documentation:**
Acceptable use of inline CSS that should be documented as a false positive in the AppExchange Security Review includes cases where the inline CSS is essential for a specific business feature and does not pose a security risk. For instance, using styles like "overflow: hidden" or "position: fixed" for functionality such as overlaying a spinner during save/submit actions can be documented as a false positive if properly justified.
The justification should explain why the CSS is required, how it supports the functionality, and provide evidence that it does not introduce vulnerabilities.
This approach helps address concerns while maintaining compliance with security standards.