Potential Vulnerability?
Your original NUI page loaded Howler.js from a remote CDN URL, something like:
<script src="https://cdnjs.cloudflare.com/ajax/libs/howler/2.2.3/howler.min.js"></script>
🧨 Why that’s dangerous
Here’s what can go wrong:
Remote Code Injection:
If that CDN ever got compromised (and it has happened before with cdnjs/unpkg/jsdelivr), the attacker could inject malicious JavaScript — crypto miners, data theft, etc.
Everyone loading your NUI would automatically execute that code in their FiveM client context.
Tracking / Data Leaks:
Remote scripts can easily send IPs, hardware identifiers, or localStorage data to external servers.
Version Hijack Risk:
If the version URL is generic (like /howler/latest/howler.min.js), it could silently change over time — meaning a future version could break or be malicious without you realizing.