This document compares DOM XSS identification tools by testing them on a real-world DOM XSS vulnerability found on pastebin.com. The vulnerability involves a JavaScript file loaded from an external domain that contains complex code. Most tools had difficulty analyzing this accurately. Runtime tools that use taint analysis were best able to follow the execution flow and identify the vulnerability, while static analyzers struggled with the indirect source and produced false positives or missed it entirely.