salvo-csrf
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [Data Exposure & Exfiltration] (SAFE): The cryptographic keys provided in the code examples (e.g., sequential digits) are non-functional placeholders intended for documentation purposes and do not constitute actual secret exposure.\n- [Indirect Prompt Injection] (SAFE): The code provides a data ingestion surface that reflects user-provided form data directly into HTML responses, creating a potential Cross-Site Scripting (XSS) vulnerability surface if implemented in production without additional sanitization.\n
- Ingestion points:
req.parse_formwithin thehandle_formhandler inSKILL.md.\n - Boundary markers: None present in the documentation examples.\n
- Capability inventory: The code demonstrates network binding via
TcpListenerand content delivery viares.render.\n - Sanitization: Not implemented in the provided snippets; user input is interpolated directly into HTML strings.
Audit Metadata