Error Reference
djust Error Reference.
Searchable catalog of common errors, misconfigurations, and pitfalls when building with djust. Each entry includes the root cause, severity, and ready-to-use fix.
Browse by Category
Severity:
All Errors
DJE-055
warning
Loading state stuck when using _skip_render with push_event
websocket
DJE-054
warning
document.addEventListener for djust: events (silent failure)
template
DJE-053
warning
Event produced no DOM changes — state outside VDOM root
template
DJE-052
warning
Excessive patches from unkeyed list reordering
performance
DJE-051
error
Duplicate keys in sibling elements
template
DJE-050
warning
Mixed keyed/unkeyed children cause suboptimal diffs
performance
DJE-043
error
Missing dj-root on root element
template
DJE-042
warning
Using @click instead of dj-click in templates
template
DJE-041
error
mount() with wrong signature
template
DJE-040
error
Missing template_name on LiveView
template
DJE-033
critical
djust not in INSTALLED_APPS
config
DJE-032
error
daphne not before staticfiles in INSTALLED_APPS
config
DJE-031
critical
Missing CHANNEL_LAYERS configuration
config
DJE-030
critical
ASGI_APPLICATION not set
config
DJE-023
warning
Upload cleanup fails silently
serialization
DJE-022
warning
WebSocket accessibility flush fails silently
websocket
DJE-021
warning
Field serialization silently skipped
serialization
DJE-020
warning
wrapper_template renders with empty context
template
DJE-014
error
PresenceMixin crash without AuthenticationMiddleware
config
DJE-013
error
_skip_render not checked in server_push
websocket
DJE-012
warning
Broadcast storm from push_to_view per keystroke
performance
DJE-011
error
innerHTML destroying event listeners
template
DJE-010
error
Textarea newlines stripped by whitespace minifier
template
DJE-005
critical
DEBUG=True in production
security
DJE-004
critical
Storing secrets in template context
security
DJE-003
error
Using escape() instead of json.dumps() for JavaScript contexts
security
DJE-002
error
Missing CSRF protection on WebSocket-adjacent views
security
DJE-001
critical
Using mark_safe() with f-strings or user input
security