Pattern Debugger UI sanitizes variables before displaying to user.DescriptionPattern Debugger UI sanitizes variables before displaying to user.Steps to Reproduce As an example, on any pattern set a variable to contain characters such as %2f3. Example string with variable name of exampleURL: https://blah:443/owa/auth/logon.aspx?replaceCurrent=1&url=https%3a%2f%2fblah.service-now.com%2fowa Debug the pattern and review the value saved to exampleURL is not the above, but instead is: https://blah:443/owa/auth/logon.aspx?replaceCurrent=1&url=https%3a//blah.service-now.com/owa WorkaroundThis is working as expected. The pattern debugger sanitizes strings which could lead to an unintended script execution in the browser. Note: This does not happen during pattern execution. This behavior is controlled by system property sa.processors.sanitize_input which has a default value of true. To stop the Pattern Designer from sanitizing the output in the UI set sa.processors.sanitize_input to false.Related Problem: PRB1615724