solid
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The routing example in
src/routes/articles/[slug].tsxuses theinnerHTMLproperty to render the article body (<div innerHTML={a().body} />). This facilitates an indirect prompt injection (Cross-Site Scripting) vulnerability if the API response contains malicious scripts. - Ingestion points: Fetches data from
/api/articles/${slug}insrc/routes/articles/[slug].tsx. - Boundary markers: None present.
- Capability inventory: Execution of arbitrary JavaScript in the user's browser context via injected tags.
- Sanitization: No sanitization or escaping of the HTML content is demonstrated in the code example.
- [COMMAND_EXECUTION]: The installation section instructs the user to run
npx degit solidjs/templates/ts. This command clones a project template from the official SolidJS GitHub organization, which is a well-known and trusted source in the frontend development ecosystem.
Audit Metadata