Use when asked to review a MR/PR on GitHub or GitLab. Checks for XSS vulnerabilities, validates ARIA attributes and WCAG compliance, identifies render-blocking issues and race conditions, enforces semantic HTML. Produces actionable feedback.
93
93%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Checklist for security review, adapted for front-end web projects. Focus on client-side vulnerabilities and third-party integrations.
innerHTML, insertAdjacentHTML) without prior sanitization. [Blocking]textContent or escaping. [Blocking]Object.assign, spread) with user-controlled data (prototype pollution). [Blocking]href, src, action attributes without validation (javascript: protocol, data: URIs). [Blocking]integrity attribute (SRI). [Important]crossorigin attribute on cross-origin scripts. [Important]nowprocket, data-cfasync, etc.). [Suggestion]localStorage, sessionStorage, or logs. [Blocking]localStorage — prefer httpOnly cookies when backend controls auth. [Blocking]console.log). [Blocking]integrity check. [Important]Access-Control-Allow-Origin: * with credentials). [Important]target="_blank" links without rel="noopener noreferrer". [Important]fetch / XMLHttpRequest calls. [Important]setInterval without clear condition (polling that never stops). [Important]if (exists) then use). [Important]fetch / async operations (no .catch(), no try/catch). [Important]