htmx
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The reference files point to well-known Content Delivery Networks (CDNs) such as
cdn.jsdelivr.netandunpkg.comfor loading the HTMX core library and its official extensions. These are established services for distributing front-end assets. - [DYNAMIC_EXECUTION]: The skill documents HTMX features that involve JavaScript evaluation, such as the
hx-onattribute for inline scripts and thejs:prefix for dynamic parameter values inhx-valsandhx-headers. These are standard functionalities of the framework, and the documentation includes clear instructions on how to restrict these capabilities for security (e.g., usinghtmx.config.allowEval = falseor thehx-disableattribute). - [DATA_EXFILTRATION]: Examples throughout the reference files demonstrate how to include authentication tokens (e.g.,
Authorizationheaders) and CSRF tokens in AJAX requests. These examples use placeholders or standard JavaScript functions (likegetToken()) and do not contain hardcoded credentials or malicious exfiltration patterns. - [INDIRECT_PROMPT_INJECTION]: The skill describes a system that ingests HTML fragments from a server (ingestion point:
SKILL.md,references/swapping.md). It documents capabilities that could be exploited if malicious HTML is processed, such as script execution via HTMX attributes (capability:references/attributes.md). However, the skill explicitly provides sanitization and boundary instructions, such as mandatory server-side escaping of user content and the use ofhx-disableto neutralize HTMX processing in untrusted DOM regions (sanitization:SKILL.md,references/gotchas.md).
Audit Metadata