Birdwatch Archive

Birdwatch Note Rating

2023-12-11 17:59:41 UTC - HELPFUL

Rated by Participant: ADFA74B9DAE8B0B9F165B6DA276DAB3E76DC553656E4D5DA1C2E31D8C92E73C0
Participant Details

Original Note:

According to OWASP, HTML Injection can allow arbitrary JavaScript code execution via event handlers. However, this rests on the assumption that CS2 both embeds a JS interpreter and that it has access to dangerous functions and/or private user data. More research is required. https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/11-Client-side_Testing/03-Testing_for_HTML_Injection

All Note Details

Original Tweet

All Information

  • noteId - 1734269609396539558
  • participantId -
  • raterParticipantId - ADFA74B9DAE8B0B9F165B6DA276DAB3E76DC553656E4D5DA1C2E31D8C92E73C0
  • createdAtMillis - 1702317581508
  • version - 2
  • agree - 0
  • disagree - 0
  • helpful - 0
  • notHelpful - 0
  • helpfulnessLevel - HELPFUL
  • helpfulOther - 0
  • helpfulInformative - 0
  • helpfulClear - 0
  • helpfulEmpathetic - 0
  • helpfulGoodSources - 0
  • helpfulUniqueContext - 0
  • helpfulAddressesClaim - 1
  • helpfulImportantContext - 0
  • helpfulUnbiasedLanguage - 0
  • notHelpfulOther - 0
  • notHelpfulIncorrect - 0
  • notHelpfulSourcesMissingOrUnreliable - 0
  • notHelpfulOpinionSpeculationOrBias - 0
  • notHelpfulMissingKeyPoints - 0
  • notHelpfulOutdated - 0
  • notHelpfulHardToUnderstand - 0
  • notHelpfulArgumentativeOrBiased - 0
  • notHelpfulOffTopic - 0
  • notHelpfulSpamHarassmentOrAbuse - 0
  • notHelpfulIrrelevantSources - 0
  • notHelpfulOpinionSpeculation - 0
  • notHelpfulNoteNotNeeded - 0
  • ratingsId - 1734269609396539558ADFA74B9DAE8B0B9F165B6DA276DAB3E76DC553656E4D5DA1C2E31D8C92E73C0