Birdwatch Archive

Birdwatch Note Rating

2023-12-12 12:41:44 UTC - HELPFUL

Rated by Participant: 7D21620F557F5775C3D5CF08B33A55CC81AC06D6CD8F3BB9BE1875B8F8AF7842
Participant Details

Original Note:

According to OWASP, HTML Injection can allow arbitrary JavaScript code execution via event handlers. However, this rests on the assumption that CS2 both embeds a JS interpreter and that it has access to dangerous functions and/or private user data. More research is required. https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/11-Client-side_Testing/03-Testing_for_HTML_Injection

All Note Details

Original Tweet

All Information

  • noteId - 1734269609396539558
  • participantId -
  • raterParticipantId - 7D21620F557F5775C3D5CF08B33A55CC81AC06D6CD8F3BB9BE1875B8F8AF7842
  • createdAtMillis - 1702384904939
  • version - 2
  • agree - 0
  • disagree - 0
  • helpful - 0
  • notHelpful - 0
  • helpfulnessLevel - HELPFUL
  • helpfulOther - 0
  • helpfulInformative - 0
  • helpfulClear - 1
  • helpfulEmpathetic - 0
  • helpfulGoodSources - 0
  • helpfulUniqueContext - 0
  • helpfulAddressesClaim - 0
  • helpfulImportantContext - 0
  • helpfulUnbiasedLanguage - 0
  • notHelpfulOther - 0
  • notHelpfulIncorrect - 0
  • notHelpfulSourcesMissingOrUnreliable - 0
  • notHelpfulOpinionSpeculationOrBias - 0
  • notHelpfulMissingKeyPoints - 0
  • notHelpfulOutdated - 0
  • notHelpfulHardToUnderstand - 0
  • notHelpfulArgumentativeOrBiased - 0
  • notHelpfulOffTopic - 0
  • notHelpfulSpamHarassmentOrAbuse - 0
  • notHelpfulIrrelevantSources - 0
  • notHelpfulOpinionSpeculation - 0
  • notHelpfulNoteNotNeeded - 0
  • ratingsId - 17342696093965395587D21620F557F5775C3D5CF08B33A55CC81AC06D6CD8F3BB9BE1875B8F8AF7842