A page of ideas on how I would look to compromise Django applications..
Django comes with a automatic HTML escaping filter, so most XSS is stopped by the automatic escaping in views
- There are places where it doesn't work (e.g https://docs.djangoproject.com/en/3.0/ref/templates/language/#automatic-html-escaping)
- If you use it inside tag attributes, you could escape the attribute and set other attributes (e.g. onclick)