Add a third solution for [Example 6 - XSS](https://github.com/upleveled/security-vulnerability-examples-next-js-postgres/tree/7e99792b93ebd70b6011804947532f5434f1c760/pages/example-6-xss), add an example of using [Trusted Types](https://auth0.com/blog/securing-spa-with-trusted-types/) / [TrustedHTML](https://twitter.com/sebastienlorber/status/1579485631260286977) to sanitize the untrusted data At a first try I couldn't manage to activate it for a single page before the XSS payload got executed, see this comment: - https://github.com/upleveled/security-vulnerability-examples-next-js-postgres/pull/24#issuecomment-1285547453