Birdwatch Archive

Birdwatch Note Rating

2023-12-11 20:37:56 UTC - HELPFUL

Rated by Participant: D9A1FB103A7EC6073870FCF610D06DE81BF2EFD4EE1C3FF124B814EBD95191BD
Participant Details

Original Note:

According to OWASP, HTML Injection can allow arbitrary JavaScript code execution via event handlers. However, this rests on the assumption that CS2 both embeds a JS interpreter and that it has access to dangerous functions and/or private user data. More research is required. https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/11-Client-side_Testing/03-Testing_for_HTML_Injection

All Note Details

Original Tweet

All Information

  • noteId - 1734269609396539558
  • participantId -
  • raterParticipantId - D9A1FB103A7EC6073870FCF610D06DE81BF2EFD4EE1C3FF124B814EBD95191BD
  • createdAtMillis - 1702327076900
  • version - 2
  • agree - 0
  • disagree - 0
  • helpful - 0
  • notHelpful - 0
  • helpfulnessLevel - HELPFUL
  • helpfulOther - 0
  • helpfulInformative - 0
  • helpfulClear - 0
  • helpfulEmpathetic - 0
  • helpfulGoodSources - 0
  • helpfulUniqueContext - 0
  • helpfulAddressesClaim - 1
  • helpfulImportantContext - 1
  • helpfulUnbiasedLanguage - 1
  • notHelpfulOther - 0
  • notHelpfulIncorrect - 0
  • notHelpfulSourcesMissingOrUnreliable - 0
  • notHelpfulOpinionSpeculationOrBias - 0
  • notHelpfulMissingKeyPoints - 0
  • notHelpfulOutdated - 0
  • notHelpfulHardToUnderstand - 0
  • notHelpfulArgumentativeOrBiased - 0
  • notHelpfulOffTopic - 0
  • notHelpfulSpamHarassmentOrAbuse - 0
  • notHelpfulIrrelevantSources - 0
  • notHelpfulOpinionSpeculation - 0
  • notHelpfulNoteNotNeeded - 0
  • ratingsId - 1734269609396539558D9A1FB103A7EC6073870FCF610D06DE81BF2EFD4EE1C3FF124B814EBD95191BD