Malicious Markdown File

XSS Injection via HTML Tags

Click on this link:

Click me!


Malicious Image

![Evil Image](javascript:alert('Image XSS Vulnerability!'))


Inline Script Injection in Link

[Click Here](javascript:alert('XSS from Link!'))


Code Block Execution

html

Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model is not currently available via any of the supported Inference Providers.
The model cannot be deployed to the HF Inference API: The model has no library tag.