Performance: XSS prevention in templates
CRITICAL IMPACT
This affects page security and user experience by preventing malicious scripts from running, which can indirectly impact rendering and interaction performance.
from flask import Flask, render_template_string app = Flask(__name__) @app.route('/') def index(): user_input = '<script>alert("XSS")</script>' return render_template_string("<p>{{ user_input }}</p>", user_input=user_input)
from flask import Flask, render_template_string app = Flask(__name__) @app.route('/') def index(): user_input = '<script>alert("XSS")</script>' return render_template_string(f"<p>{user_input}</p>")
| Pattern | DOM Operations | Reflows | Paint Cost | Verdict |
|---|---|---|---|---|
| Direct user input injection without escaping | Normal DOM nodes | Potential multiple reflows if scripts modify DOM | High paint cost if scripts run | [X] Bad |
| User input safely escaped by Flask templates | Normal DOM nodes | Single reflow on render | Normal paint cost | [OK] Good |