diff --git a/IPython/html/tests/casperjs/test_cases/inject_js.js b/IPython/html/tests/casperjs/test_cases/inject_js.js
new file mode 100644
index 0000000..805ab83
--- /dev/null
+++ b/IPython/html/tests/casperjs/test_cases/inject_js.js
@@ -0,0 +1,23 @@
+//
+// Test robustness about JS injection in different place
+//
+// This assume malicious document arrive to the frontend.
+//
+
+casper.notebook_test(function () {
+ var messages = [];
+ this.on('remote.alert', function (msg) {
+ messages.push(msg);
+ });
+
+ this.evaluate(function () {
+ var cell = IPython.notebook.get_cell(0);
+ var json = cell.toJSON()
+ json.prompt_number = ""
+ cell.fromJSON(j)
+ });
+
+ this.then(function () {
+ this.test.assert(messages.length == 0, "Captured log message from script tag injection !");
+ });
+});