The flux-async example app embeds unsanitised query parameters in HTTP error responses. Of course, it's only an example, so this isn't a real security vulnerability, but it might perhaps make sense to introduce sanitisation anyway, in case people copy it for real usage.
(In fact, the original example app is safe, since the error response is always a constant string. That seems to have been an accident, though, and I think it was meant to be a template string embedding the missing ID, cf first commit.)
The flux-async example app embeds unsanitised query parameters in HTTP error responses. Of course, it's only an example, so this isn't a real security vulnerability, but it might perhaps make sense to introduce sanitisation anyway, in case people copy it for real usage.
(In fact, the original example app is safe, since the error response is always a constant string. That seems to have been an accident, though, and I think it was meant to be a template string embedding the missing ID, cf first commit.)