Constrain `res.render()` trust boundaries
Express view names should not cross into server-side rendering from untrusted input.
#Metadata
#Why it matters
Untrusted template names can expose internal views, bypass intended route behavior, or widen a server-side template boundary.
#Remediation
Resolve the template from an allowlist or fixed route mapping before calling `res.render()`.
#Repository path
The generated metadata points to critiq-rules/libs/rules/catalog/rules/typescript/ts.security.user-controlled-view-render.rule.yaml.