We prevent scripts from running by not allowing you to view HTML versions of the message. The message itself remains intact on disk as is, but we can't have javascript or dangerous html entities running from the browser. Someone could inject JS that controls your page, allowing them for example to steal your authentication token allowing their server to make authenticated calls on your behalf. Do to the extreme nature of this type of attack we erred on the side of caution on some of the things we allow in HTML. However, I have also noticed an increase in messages that are being detected due to <forms> in the message. Could you send me the raw/HTML content of one of these emails to my DM's? I'll run it through our filter locally and see why it's being detected.
If we can get a solid base of examples I can go through them and maybe we can loosen up the checks on these messages depending on what they are doing.
Matt Petty
Senior Software Developer
SmarterTools Inc.
www.smartertools.com