Mark6

F 47 completed
Other
unknown / go · tiny
5
Files
227
LOC
0
Frameworks
2
Languages

Pipeline State

completed
Run ID
#395580
Phase
done
Progress
1%
Started
Finished
2026-04-13 01:31:02
LLM tokens
0

Pipeline Metadata

Stage
Skipped
Decision
skip_tiny
Novelty
15.02
Framework unique
Isolation
Last stage change
2026-04-16 18:15:42
Deduplication group #47248
Member of a group with 1 similar repo(s) — canonical #102911 view group →
Top concepts (1)
Project Description
Provenance: Repobility (https://repobility.com) — every score reproducible from /scan/

AI Prompt

Create a Go program that functions as an HTML sanitizer. The goal is to take an input HTML string and output a safe version by only allowing a predefined whitelist of tags and attributes. I need to be able to specify which tags and attributes are permitted, and the sanitizer should handle complex structures like nested elements. Also, please include functionality to run a callback function when specific tags or classes are encountered during parsing.
go html-sanitizer security parsing web-utility
Generated by gemma4:latest

Catalog Information

HTMLサニタイザー。許可するタグと属性をホワイトリスト形式で指定し、安全なHTMLを出力します。

Description

HTMLサニタイザー。許可するタグと属性をホワイトリスト形式で指定し、安全なHTMLを出力します。

Novelty

3/10

Tags

go html-sanitizer security parsing web-utility

Claude Models

claude-opus-4-6

Quality Score

F
47.1/100
Structure
44
Code Quality
45
Documentation
33
Testing
0
Practices
80
Security
100
Dependencies
60

Strengths

  • Consistent naming conventions (snake_case)
  • Good security practices \u2014 no major issues detected

Weaknesses

  • No LICENSE file \u2014 legal ambiguity for contributors
  • No tests found \u2014 high risk of regressions
  • No CI/CD configuration \u2014 manual testing and deployment

Recommendations

  • Add a test suite \u2014 start with critical path integration tests
  • Set up CI/CD (GitHub Actions recommended) to automate testing and deployment
  • Add a linter configuration to enforce code style consistency
  • Add a LICENSE file (MIT recommended for open source)

Security & Health

4.1h
Tech Debt (E)
A
OWASP (100%)
FAIL
Quality Gate
B
Risk (22)
Repobility analyzer · published findings · https://repobility.com
Unknown
License
0.0%
Duplication
Full Security Report AI Fix Prompts SARIF SBOM

Languages

go
67.4%
markdown
32.6%

Frameworks

None detected

Concepts (1)

Scored by Repobility's multi-pass pipeline · https://repobility.com
CategoryNameDescriptionConfidence
Repobility analyzer · published findings · https://repobility.com
auto_descriptionProject DescriptionHTMLサニタイザー。許可するタグと属性をホワイトリスト形式で指定し、安全なHTMLを出力します。80%

Quality Timeline

1 quality score recorded.

View File Metrics

Embed Badge

Add to your README:

![Quality](https://repos.aljefra.com/badge/119937.svg)
Quality BadgeSecurity Badge
Export Quality CSVDownload SBOMExport Findings CSV