nextjs-app-router
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The example code for a dynamic blog post page in
SKILL.mdcreates a surface for indirect prompt injection via a Cross-Site Scripting (XSS) vector. - Ingestion points: Data is fetched from an external source via
getPost(params.slug)and stored inpost.contentwithinapp/blog/[slug]/page.tsx. - Boundary markers: The provided code snippet lacks markers or instructions to treat the fetched content as untrusted HTML.
- Capability inventory: The example utilizes the
dangerouslySetInnerHTMLproperty, which allows the execution of arbitrary scripts in the browser if the fetched data is malicious. - Sanitization: The skill does not demonstrate or mention the need for HTML sanitization or filtering of the external content before it is rendered.
Audit Metadata