syncfusion-blazor-rich-text-editor

Pass

Audited by Gen Agent Trust Hub on Mar 25, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: Fetches required NuGet packages (Syncfusion.Blazor.RichTextEditor, Syncfusion.Blazor.Themes) from official package registries.\n- [EXTERNAL_DOWNLOADS]: References official Syncfusion service URLs for handling document imports and exports, such as https://blazor.syncfusion.com/services/production/api/RichTextEditor/ImportFromWord.\n- [COMMAND_EXECUTION]: Includes standard .NET CLI commands for adding vendor packages to a project.\n- [PROMPT_INJECTION]: As the editor component processes and renders HTML/Markdown content from potentially untrusted users, it presents a surface for indirect prompt injection. The documentation correctly identifies this and highlights the built-in EnableHtmlSanitizer (on by default) and paste cleanup settings as primary security guardrails. Mandatory evidence chain for Indirect Prompt Injection: Ingestion points: Value and @bind-Value properties in SKILL.md and references/data-binding.md; Boundary markers: EnableHtmlSanitizer is enabled by default; Capability inventory: File-write capabilities via server-side upload examples in references/images-and-media.md; Sanitization: EnableHtmlSanitizer and RichTextEditorPasteCleanupSettings are documented.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 25, 2026, 04:41 PM