Birdwatch Archive

Birdwatch Note Rating

2023-12-12 06:37:03 UTC - SOMEWHAT_HELPFUL

Rated by Participant: 7C997485C660734708D27ADE799301080AAEB92BB7F8322847A5F7D831C375CB
Participant Details

Original Note:

According to OWASP, HTML Injection can allow arbitrary JavaScript code execution via event handlers. However, this rests on the assumption that CS2 both embeds a JS interpreter and that it has access to dangerous functions and/or private user data. More research is required. https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/11-Client-side_Testing/03-Testing_for_HTML_Injection

All Note Details

Original Tweet

All Information

  • noteId - 1734269609396539558
  • participantId -
  • raterParticipantId - 7C997485C660734708D27ADE799301080AAEB92BB7F8322847A5F7D831C375CB
  • createdAtMillis - 1702363023741
  • version - 2
  • agree - 0
  • disagree - 0
  • helpful - 0
  • notHelpful - 0
  • helpfulnessLevel - SOMEWHAT_HELPFUL
  • helpfulOther - 0
  • helpfulInformative - 0
  • helpfulClear - 1
  • helpfulEmpathetic - 0
  • helpfulGoodSources - 1
  • helpfulUniqueContext - 0
  • helpfulAddressesClaim - 0
  • helpfulImportantContext - 0
  • helpfulUnbiasedLanguage - 0
  • notHelpfulOther - 1
  • notHelpfulIncorrect - 0
  • notHelpfulSourcesMissingOrUnreliable - 0
  • notHelpfulOpinionSpeculationOrBias - 0
  • notHelpfulMissingKeyPoints - 0
  • notHelpfulOutdated - 0
  • notHelpfulHardToUnderstand - 0
  • notHelpfulArgumentativeOrBiased - 0
  • notHelpfulOffTopic - 0
  • notHelpfulSpamHarassmentOrAbuse - 0
  • notHelpfulIrrelevantSources - 0
  • notHelpfulOpinionSpeculation - 0
  • notHelpfulNoteNotNeeded - 0
  • ratingsId - 17342696093965395587C997485C660734708D27ADE799301080AAEB92BB7F8322847A5F7D831C375CB