The article discusses the concept of htmx applications, their differences from other web applications, and the potential XSS vulnerabilities. It also explains various attributes in htmx that can be targeted for XSS attacks and ways to control the behavior of htmx applications.
Table of contents
Hacking htmx applicationsBackgroundNew javascript sinksControlling behavior htmx wayTLDR of pentesting an htmx app for XSSAuthors3 Comments
Sort: