User input directly inserted into DOM without sanitization
URL parameters reflected in page without encoding
SQL queries constructed with user input in JavaScript
User input passed directly to eval() function
Unsanitized content inserted via innerHTML property
Legacy document.write() with unsanitized input
Cookies without HttpOnly, Secure, or SameSite attributes
Page can be embedded in iframe - no X-Frame-Options header
Click here to test clickjacking
Client-side redirects without URL validation
Using Math.random() for security-sensitive operations
Using Base64 encoding as encryption for sensitive data
Exposing sensitive system and user information
Unsafe cross-frame communication without origin validation
Parsing untrusted JSON without validation
Unsafe file path construction in client-side code
Dynamically loading scripts from user-controlled sources