If the contents of the data-confirm attribute contain user-generated content, this library opens up the app to possible XSS vulnerabilities, which makes sense given the use of the html() function here.
Is it by design to allow script tags to execute if passed into the body? I understand the desire to pass in HTML that is rendered properly in the modal body, but perhaps we can work to prevent these script tags from also executing. Thoughts?
Crude Example:
<% # Assumption: user.name = "<script>alert('oops')</script>" %>
<%= link_to("Open", "#", data: { confirm: "Are you sure you want to open this #{user.name}?" }) %>