This is what Quttera flags as potentially suspicious: Results from scanning URL: -http://areena.yle.fi/awp-assets/generated/bundle.js?checksum=94aebde8f9384075c64d98485c2285add400ad680c8c853debdaaa610b2f5a47
Number of sources found: 337
Number of sinks found: 441
SyntaxError: missing ; before statement: something with the stream there, e.g. format(‘woff’),url('data:application/octet-stream;base64,
Well to create the blob data → http://stackoverflow.com/questions/16245767/creating-a-blob-from-a-base64-string-in-javascript
or even this tool: https://github.com/atanasovskib/excellentexport/commit/7eab22b00a5732791c8fa293c84bcd870116b07b

What I have seen, I would not be too alarmed. As the code is "same origin"as proper SRI hash is generated, it is secure.
But there are SRI issues but for external script links: https://sritest.io/#report/db16d52a-1890-471f-a97b-c948ed76960a
which gives the website in this respect a D-status only. Active for -https://cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js
That is all I could dig up for you at the moment. By the way the code flagged as potentially suspicious by Quttera’s was developed in Sweden. :wink:

About the risk of the blob database

What’s important is what kind of validation you do, and how you address the threats. Any of the standard mitigations can be made to work, no matter how you decide to store the uploaded file – the important thing is that you understand the risks and select mitigations appropriate that are appropriate for your application.
Quote information credits go to StackOverflow’s D.W. & rook (with data stored in a file you have much more control over it).

polonus (volunteer website security analyst and website error-hunter)