liveview-js-interop
Pass
Audited by Gen Agent Trust Hub on May 1, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: The skill serves as a technical guide for Phoenix LiveView development and does not contain any malicious patterns or instructions. All provided code snippets follow documented framework conventions.
- [DATA_EXPOSURE]: Documents legitimate patterns for using
localStorageto persist UI state across sessions. This is a standard functional requirement for many web applications and is implemented here via client-side hooks. - [DYNAMIC_EXECUTION]: Describes the use of
JS.execfor executing Phoenix's declarative JavaScript command DSL from DOM data attributes. This is a native framework feature designed for patch-safe DOM transitions and visibility toggling. - [INDIRECT_PROMPT_INJECTION]: Identifies data ingestion surfaces where the agent reads configuration or content from DOM
data-*attributes (e.g.,dataset.config,dataset.content). These patterns are standard for bridging server-side data to client-side libraries and do not represent an atypical security risk in this context.
Audit Metadata