how-to-create-html-web-components-with-dart
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (LOW): The JavaScript code example demonstrates a potential XSS vulnerability surface by assigning an unsanitized attribute value directly to
innerHTML.\n- Ingestion points:this.getAttribute('name')in theHelloWorldclass inSKILL.md.\n- Boundary markers: Absent.\n- Capability inventory: Client-side DOM manipulation viainnerHTML.\n- Sanitization: Absent. UsetextContentorinnerTextto mitigate this risk.\n- Data Exposure & Exfiltration (SAFE): No hardcoded secrets, sensitive file paths, or unauthorized data access patterns were detected.\n- External Downloads (SAFE): References to external sites (MDN, GitHub, pub.dev) are purely educational and point to trusted domains.
Audit Metadata