Validation Results for EICRAnonymized

Generated Mon Aug 26 19:45:05 UTC 2024, FHIR version 4.0.1 for ecr.fhir.us.anonymized-eicr#1.0.0 (canonical = http://fhir.org/fhir/us/anonymized-eicr (history)). See Full QA Report

Quality Checks
Publisher Version:IG Publisher Version: v1.6.20
Publication Code:n/a . PackageId = ecr.fhir.us.anonymized-eicr, Canonical = http://fhir.org/fhir/us/anonymized-eicr
Realm Check for n/a:
  • n/a
Publication Request:
  • Error fetching package-list from http://fhir.org/fhir/us/anonymized-eicr: Not Found
  • This IG has never been published, so the version should start with '0.' or include a patch version e.g. '-ballot'
  • No publication request found
Supressed Messages:No Suppressed Issues
Dependency Checks:
PackageVersionFHIRCanonicalWeb BaseComment
.. ecr.fhir.us.anonymized-eicr1.0.0R4http://fhir.org/fhir/us/anonymized-eicr
... hl7.terminology.r46.0.2 MR4http://terminology.hl7.orghttp://terminology.hl7.org/6.0.2
... hl7.fhir.uv.extensions.r45.1.0 MR4http://hl7.org/fhir/extensionshttp://hl7.org/fhir/extensions/5.1.0
... hl7.fhir.us.ecr2.1.1 MR4http://hl7.org/fhir/us/ecrhttp://hl7.org/fhir/us/ecr/STU2.1
.... hl7.terminology.r45.3.0 OR4http://terminology.hl7.orghttp://terminology.hl7.org/5.3.0Latest Release is 6.0.2
.... hl7.fhir.uv.extensions.r41.0.0 OR4http://hl7.org/fhir/extensionshttp://hl7.org/fhir/extensions/1.0.0Latest Release is 5.1.0
.... hl7.fhir.us.core4.0.0 OR4http://hl7.org/fhir/us/corehttp://hl7.org/fhir/us/core/STU4Latest Release is 7.0.0
..... hl7.fhir.uv.bulkdata1.0.1 OR4http://hl7.org/fhir/uv/bulkdatahttp://hl7.org/fhir/uv/bulkdata/STU1.0.1Latest Release is 2.0.0
..... us.nlm.vsac0.3.0 OR4http://fhir.org/packages/us.nlm.vsachttp://fhir.org/packages/us.nlm.vsacLatest Release is 0.19.0
.... us.nlm.vsac0.17.0 OR4http://fhir.org/packages/us.nlm.vsachttp://fhir.org/packages/us.nlm.vsacLatest Release is 0.19.0
.... us.cdc.phinvads0.12.0 MR4http://fhir.org/packages/us.cdc.phinvadshttp://fhir.org/packages/us.cdc.phinvads
.... hl7.fhir.us.vr-common-library1.0.0 OR4http://hl7.org/fhir/us/vr-common-libraryhttp://hl7.org/fhir/us/vr-common-library/STU1Latest Release is 1.1.0
..... hl7.fhir.us.core4.0.0 OR4http://hl7.org/fhir/us/corehttp://hl7.org/fhir/us/core/STU4see above. Latest Release is 7.0.0
..... us.cdc.phinvads0.7.0 OR4http://fhir.org/packages/us.cdc.phinvadshttp://fhir.org/packages/us.cdc.phinvadsLatest Release is 0.12.0
.... hl7.fhir.us.odh1.1.0 OR4http://hl7.org/fhir/us/odhhttp://hl7.org/fhir/us/odh/STU1.1Latest Release is 1.3.0
..... hl7.fhir.us.core3.1.1 OR4http://hl7.org/fhir/us/corehttp://hl7.org/fhir/us/core/STU3.1.1Latest Release is 7.0.0
..... us.cdc.phinvads0.7.0 OR4http://fhir.org/packages/us.cdc.phinvadshttp://fhir.org/packages/us.cdc.phinvadssee above. Latest Release is 0.12.0
.... hl7.fhir.uv.bulkdata1.1.0 OR4http://hl7.org/fhir/uv/bulkdatahttp://hl7.org/fhir/uv/bulkdata/2021MayLatest Release is 2.0.0
... us.nlm.vsac0.18.0 OR4http://fhir.org/packages/us.nlm.vsachttp://fhir.org/packages/us.nlm.vsacLatest Release is 0.19.0
... hl7.fhir.us.core4.0.0 OR4http://hl7.org/fhir/us/corehttp://hl7.org/fhir/us/core/STU4see above. Latest Release is 7.0.0
... hl7.fhir.us.odh1.1.0 OR4http://hl7.org/fhir/us/odhhttp://hl7.org/fhir/us/odh/STU1.1see above. Latest Release is 1.3.0
Templates: ecr.fhir.template#1.0.0 -> fhir.base.template#current. Tools: 0.1.0
Dependent IGs:no references
Global Profiles:(none declared)
Terminology Server(s):http://tx.fhir.org/r4 (details)
HTA Analysis:Non-HL7 Igs are exempt from terminology dependency analysis
R5 Dependencies:(none)
Draft Dependencies:
Modifier Extensions:(none)
Previous Version Comparison: Unable to compare with previous version: Unable to find version history at http://fhir.org/fhir/us/anonymized-eicr (Problem #1 with package-list.json at http://fhir.org/fhir/us/anonymized-eicr: Not Found)
IPA Comparison: n/a
IPS Comparison: n/a
Summary: errors = 4, warn = 109, info = 279, broken links = 0
FilenameErrorsWarningsHints
Build Errors000
/scratch/repo/fsh-generated/resources/Bundle-bundle-document-zika-anon24882
/scratch/repo/fsh-generated/resources/Condition-condition-common-cold-anon010
/scratch/repo/fsh-generated/resources/Condition-condition-zika-anon010
/scratch/repo/fsh-generated/resources/DocumentReference-documentreference-add-reporting-needs-pdf040
/scratch/repo/fsh-generated/resources/DocumentReference-documentreference-zika-follow-up-pdf040
/scratch/repo/fsh-generated/resources/DocumentReference-documentreference-zika-info-pdf040
/scratch/repo/fsh-generated/resources/Observation-observation-blood-pressure-anon010
/scratch/repo/fsh-generated/resources/Observation-observation-calculated-age-anon010
/scratch/repo/fsh-generated/resources/Observation-observation-country-of-nationality-anon010
/scratch/repo/fsh-generated/resources/Observation-observation-country-of-residence-anon010
/scratch/repo/fsh-generated/resources/Observation-observation-disability-status-anon010
/scratch/repo/fsh-generated/resources/Observation-observation-emergency-outbreak-info-anon010
/scratch/repo/fsh-generated/resources/Observation-observation-lab-result-lymphocytes-anon010
/scratch/repo/fsh-generated/resources/Observation-observation-odh-usual-work-anon014
/scratch/repo/fsh-generated/resources/Observation-observation-past-or-present-job-anon014
/scratch/repo/fsh-generated/resources/Observation-observation-pregnancy-status-anon010
/scratch/repo/fsh-generated/resources/Observation-observation-rr-relevant-reportable-condition-anon121
/scratch/repo/fsh-generated/resources/Observation-observation-rr-reportability-information-anon152
/scratch/repo/fsh-generated/resources/Observation-observation-travel-history-201801-anon011
/scratch/repo/fsh-generated/resources/Observation-observation-vaccine-credential-assertion-anon010
/scratch/repo/fsh-generated/resources/StructureDefinition-eicr-anon-caculated-age016
/scratch/repo/fsh-generated/resources/StructureDefinition-eicr-anon-composition019115
/scratch/repo/fsh-generated/resources/StructureDefinition-eicr-anon-encounter016
/scratch/repo/fsh-generated/resources/StructureDefinition-eicr-anon-immunization016
/scratch/repo/fsh-generated/resources/StructureDefinition-eicr-anon-organization016
/scratch/repo/fsh-generated/resources/StructureDefinition-eicr-anon-past-or-present-job016
/scratch/repo/fsh-generated/resources/StructureDefinition-eicr-anon-patient016
/scratch/repo/fsh-generated/resources/StructureDefinition-eicr-anon-practitioner016
/scratch/repo/fsh-generated/resources/StructureDefinition-eicr-anon-practitionerrole016
/scratch/repo/fsh-generated/resources/StructureDefinition-eicr-anon-relatedperson016

n/a Show Validation Information


fsh-generated/resources/Bundle-bundle-document-zika-anon.json Show Validation Information (198)

PathSeverityMessage
Bundle.entry[1] (l589/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[2] (l633/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[3] (l682/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[4] (l731/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[5] (l846/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[6] (l883/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[7] (l950/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[8] (l1017/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[9] (l1096/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[10] (l1186/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[11] (l1228/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[12] (l1273/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[13] (l1318/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[14] (l1355/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[15] (l1425/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[16] (l1519/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[17] (l1626/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[18] (l1708/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[19] (l1742/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[20] (l1820/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[21] (l1865/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[22] (l1926/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[23] (l1983/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[24] (l2033/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[25] (l2083/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[26] (l2327/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[27] (l2393/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[28] (l2467/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[29] (l2520/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[30] (l2607/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[31] (l2667/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[32] (l2720/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[33] (l2825/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[34] (l2886/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[35] (l2947/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[36] (l3008/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[37] (l3079/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[38] (l3150/c6)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-document-bundle|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[0]​.resource​.section[17]​.entry[0] (l544​/c16)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-composition|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[1]​.resource​/*Condition​/condition-zika-anon*​/ (l590​/c8)warningConstraint failed: con-3: 'Condition.clinicalStatus SHALL be present if verificationStatus is not entered-in-error and category is problem-list-item' (defined in http://hl7.org/fhir/StructureDefinition/Condition) (Best Practice Recommendation)
Bundle​.entry[2]​.resource​/*Condition​/condition-common-cold-anon*​/ (l634​/c8)warningConstraint failed: con-3: 'Condition.clinicalStatus SHALL be present if verificationStatus is not entered-in-error and category is problem-list-item' (defined in http://hl7.org/fhir/StructureDefinition/Condition) (Best Practice Recommendation)
Bundle​.entry[9]​.resource​/*Observation​/observation-blood-pressure-anon*​/ (l1097​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[10]​.resource​/*Observation​/observation-calculated-age-anon*​/ (l1187​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[11]​.resource​/*Observation​/observation-country-of-nationality-anon*​/ (l1229​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[12]​.resource​/*Observation​/observation-country-of-residence-anon*​/ (l1274​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[13]​.resource​/*Observation​/observation-disability-status-anon*​/ (l1319​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[14]​.resource​/*Observation​/observation-odh-usual-work-anon*​/ (l1356​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[14]​.resource​/*Observation​/observation-odh-usual-work-anon*​/​.value​.ofType(CodeableConcept)​.coding[0] (l1413​/c10)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.314' could not be found, so the code cannot be validated
Bundle​.entry[14]​.resource​/*Observation​/observation-odh-usual-work-anon*​/​.component[0]​.value​.ofType(CodeableConcept)​.coding[0]​.system (l1375​/c14)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.315' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Bundle​.entry[14]​.resource​.value​.ofType(CodeableConcept)​.coding[0] (l1413​/c10)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.314' could not be found, so the code cannot be validated
Bundle​.entry[14]​.resource​.value​.ofType(CodeableConcept)​.coding[0] (l1415​/c14)Slicing InformationThis element does not match any known slice defined in the profile http://hl7.org/fhir/us/odh/StructureDefinition/odh-UsualWork|1.1.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[14]​.resource​.component[0]​.value​.ofType(CodeableConcept)​.coding[0]​.system (l1375​/c14)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.315' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Bundle​.entry[14]​.resource​.component[0]​.value​.ofType(CodeableConcept)​.coding[0] (l1377​/c18)Slicing InformationThis element does not match any known slice defined in the profile http://hl7.org/fhir/us/odh/StructureDefinition/odh-UsualWork|1.1.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[15]​.resource​/*Observation​/observation-past-or-present-job-anon*​/ (l1426​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[15]​.resource​/*Observation​/observation-past-or-present-job-anon*​/​.value​.ofType(CodeableConcept)​.coding[0]​.system (l1473​/c10)informationA definition for CodeSystem 'http://terminology.hl7.org/CodeSystem/PHOccupationCDCCensus2010' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Bundle​.entry[15]​.resource​/*Observation​/observation-past-or-present-job-anon*​/​.component[0]​.value​.ofType(CodeableConcept)​.coding[0]​.system (l1493​/c14)informationA definition for CodeSystem 'http://terminology.hl7.org/CodeSystem/PHIndustryCDCCensus2010' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Bundle​.entry[15]​.resource​.value​.ofType(CodeableConcept)​.coding[0]​.system (l1473​/c10)informationA definition for CodeSystem 'http://terminology.hl7.org/CodeSystem/PHOccupationCDCCensus2010' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Bundle​.entry[15]​.resource​.value​.ofType(CodeableConcept)​.coding[0] (l1475​/c14)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-past-or-present-job|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[15]​.resource​.component[0]​.value​.ofType(CodeableConcept)​.coding[0]​.system (l1493​/c14)informationA definition for CodeSystem 'http://terminology.hl7.org/CodeSystem/PHIndustryCDCCensus2010' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Bundle​.entry[15]​.resource​.component[0]​.value​.ofType(CodeableConcept)​.coding[0] (l1495​/c18)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-past-or-present-job|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[16]​.resource​/*Observation​/observation-pregnancy-status-anon*​/ (l1520​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[17]​.resource​/*Observation​/observation-travel-history-201801-anon*​/ (l1627​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[17]​.resource​/*Observation​/observation-travel-history-201801-anon*​/​.component[0]​.value​.ofType(CodeableConcept)​.coding[0]​.system (l1656​/c14)informationA definition for CodeSystem 'urn:oid:1.0.3166.1' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Bundle​.entry[17]​.resource​.component[0]​.value​.ofType(CodeableConcept)​.coding[0]​.system (l1656​/c14)informationA definition for CodeSystem 'urn:oid:1.0.3166.1' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Bundle​.entry[18]​.resource​/*Observation​/observation-emergency-outbreak-info-anon*​/ (l1709​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[19]​.resource​/*Observation​/observation-lab-result-lymphocytes-anon*​/ (l1743​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[20]​.resource​/*Observation​/observation-vaccine-credential-assertion-anon*​/ (l1821​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[21]​.resource​/*Organization​/organization-acme-laboratory*​/​.identifier[0] (l1885​/c12)Slicing InformationThis element does not match any known slice defined in the profile http://hl7.org/fhir/us/ecr/StructureDefinition/us-ph-organization|2.1.1 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[22]​.resource​/*Organization​/organization-name-tele-addr-anon*​/​.identifier[0] (l1966​/c12)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-organization|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[23]​.resource​/*Organization​/organization-custodian*​/​.identifier[0] (l2003​/c12)Slicing InformationThis element does not match any known slice defined in the profile http://hl7.org/fhir/us/ecr/StructureDefinition/us-ph-organization|2.1.1 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[24]​.resource​/*Organization​/organization-salem-medical-center*​/​.identifier[0] (l2053​/c12)Slicing InformationThis element does not match any known slice defined in the profile http://hl7.org/fhir/us/ecr/StructureDefinition/us-ph-organization|2.1.1 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[30]​.resource​/*ServiceRequest​/servicerequest-zika-anon*​/​.category[0]​.coding[0]​.code (l2635​/c12)informationThe code '103693007' is valid but is not active (from http://tx.fhir.org/r4)
Bundle​.entry[30]​.resource​.category[0]​.coding[0]​.code (l2635​/c12)informationThe code '103693007' is valid but is not active (from http://tx.fhir.org/r4)
Bundle​.entry[31]​.resource​/*Observation​/observation-rr-relevant-reportable-condition-anon*​/ (l2668​/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle​.entry[31]​.resource​/*Observation​/observation-rr-relevant-reportable-condition-anon*​/ (l2668​/c8)warningBest Practice Recommendation: In general, all observations should have an effective[x] ()
Bundle​.entry[31]​.resource​/*Observation​/observation-rr-relevant-reportable-condition-anon*​/​.hasMember[0] (l2713​/c12)Slicing InformationDetails for Observation/observation-rr-reportability-information-anon matching against profile http://hl7.org/fhir/StructureDefinition/Observation|4.0.1 Show Reasoning
Bundle​.entry[31]​.resource​.hasMember[0] (l2713​/c12)Slicing InformationThis element does not match any known slice defined in the profile http://hl7.org/fhir/us/ecr/StructureDefinition/rr-relevant-reportable-condition-observation|2.1.1 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle.entry[31].resource (l2668/c8)errorSlice 'Observation.hasMember:sliceReportabilityInformationObservation': a matching slice is required, but not found (from http://hl7.org/fhir/us/ecr/StructureDefinition/rr-relevant-reportable-condition-observation|2.1.1). Note that other slices are allowed in addition to this required slice
Bundle​.entry[31]​.resource​.hasMember[0] (l2713​/c12)Slicing InformationDetails for Observation/observation-rr-reportability-information-anon matching against profile http://hl7.org/fhir/StructureDefinition/Observation|4.0.1 Show Reasoning
Bundle​.entry[32]​.resource​/*Observation​/observation-rr-reportability-information-anon*​/ (l2721​/c8)warningBest Practice Recommendation: In general, all observations should have an effective[x] ()
Bundle​.entry[32]​.resource​/*Observation​/observation-rr-reportability-information-anon*​/​.extension[0]​.value​.ofType(CodeableConcept)​.coding[0]​.system (l2743​/c14)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Bundle​.entry[32]​.resource​/*Observation​/observation-rr-reportability-information-anon*​/​.extension[0]​.value​.ofType(CodeableConcept) (l2743​/c14)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.3|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Bundle​.entry[32]​.resource​/*Observation​/observation-rr-reportability-information-anon*​/​.extension[0]​.value​.ofType(CodeableConcept) (l2743​/c14)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated; Unable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.3|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Bundle​.entry[32]​.resource​/*Observation​/observation-rr-reportability-information-anon*​/​.extension[0]​.value​.ofType(CodeableConcept)​.coding[0] (l2743​/c14)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
Bundle​.entry[32]​.resource​/*Observation​/observation-rr-reportability-information-anon*​/​.code​.coding[0] (l2780​/c10)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
Bundle​.entry[32]​.resource​/*Observation​/observation-rr-reportability-information-anon*​/​.component[0]​.code​.coding[0] (l2805​/c14)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.232' could not be found, so the code cannot be validated
Bundle​.entry[32]​.resource​.extension[0]​.value​.ofType(CodeableConcept)​.coding[0]​.system (l2743​/c14)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Bundle​.entry[32]​.resource​.extension[0]​.value​.ofType(CodeableConcept) (l2743​/c14)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.3|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Bundle​.entry[32]​.resource​.extension[0]​.value​.ofType(CodeableConcept) (l2743​/c14)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated; Unable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.3|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Bundle​.entry[32]​.resource​.extension[0]​.value​.ofType(CodeableConcept)​.coding[0] (l2743​/c14)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
Bundle​.entry[32]​.resource​.code​.coding[0] (l2780​/c10)errorA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated (error because this is a required binding)
Bundle​.entry[32]​.resource​.code (l2780​/c10)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.6|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Bundle​.entry[32]​.resource​.component[0]​.code​.coding[0] (l2805​/c14)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.232' could not be found, so the code cannot be validated
Bundle​.entry[33]​.resource​/*Organization​/organization-rr-responsible-agency-haw*​/​.type[0]​.coding[0] (l2835​/c12)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.232' could not be found, so the code cannot be validated
Bundle​.entry[33]​.resource​.identifier[0] (l2856​/c12)Slicing InformationThis element does not match any known slice defined in the profile http://hl7.org/fhir/us/ecr/StructureDefinition/rr-responsible-agency-organization|2.1.1 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[33]​.resource​.type[0]​.coding[0] (l2835​/c12)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.232' could not be found, so the code cannot be validated
Bundle​.entry[34]​.resource​/*Organization​/organization-rr-routing-entity-haw*​/​.type[0]​.coding[0] (l2896​/c12)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.232' could not be found, so the code cannot be validated
Bundle​.entry[34]​.resource​.identifier[0] (l2917​/c12)Slicing InformationThis element does not match any known slice defined in the profile http://hl7.org/fhir/us/ecr/StructureDefinition/rr-routing-entity-organization|2.1.1 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[34]​.resource​.type[0]​.coding[0] (l2896​/c12)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.232' could not be found, so the code cannot be validated
Bundle​.entry[35]​.resource​/*Organization​/organization-rr-rules-authoring-agency-haw*​/​.type[0]​.coding[0]​.system (l2957​/c12)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.232' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Bundle​.entry[35]​.resource​.identifier[0] (l2978​/c12)Slicing InformationThis element does not match any known slice defined in the profile http://hl7.org/fhir/us/ecr/StructureDefinition/rr-rules-authoring-agency-organization|2.1.1 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Bundle​.entry[35]​.resource​.type[0]​.coding[0]​.system (l2957​/c12)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.232' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Bundle​.entry[36]​.resource​/*DocumentReference​/documentreference-add-reporting-needs-pdf*​/​.extension[0]​.value​.ofType(CodeableConcept)​.coding[0] (l3030​/c14)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
Bundle​.entry[36]​.resource​/*DocumentReference​/documentreference-add-reporting-needs-pdf*​/​.extension[0]​.value​.ofType(CodeableConcept) (l3030​/c14)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.5|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Bundle​.entry[36]​.resource​/*DocumentReference​/documentreference-add-reporting-needs-pdf*​/​.category[0]​.coding[0] (l3053​/c12)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
Bundle​.entry[36]​.resource​/*DocumentReference​/documentreference-add-reporting-needs-pdf*​/​.category[0] (l3053​/c12)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.4|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Bundle​.entry[37]​.resource​/*DocumentReference​/documentreference-zika-follow-up-pdf*​/​.extension[0]​.value​.ofType(CodeableConcept)​.coding[0] (l3101​/c14)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
Bundle​.entry[37]​.resource​/*DocumentReference​/documentreference-zika-follow-up-pdf*​/​.extension[0]​.value​.ofType(CodeableConcept) (l3101​/c14)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.5|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Bundle​.entry[37]​.resource​/*DocumentReference​/documentreference-zika-follow-up-pdf*​/​.category[0]​.coding[0] (l3124​/c12)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
Bundle​.entry[37]​.resource​/*DocumentReference​/documentreference-zika-follow-up-pdf*​/​.category[0] (l3124​/c12)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.4|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Bundle​.entry[38]​.resource​/*DocumentReference​/documentreference-zika-info-pdf*​/​.extension[0]​.value​.ofType(CodeableConcept)​.coding[0] (l3172​/c14)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
Bundle​.entry[38]​.resource​/*DocumentReference​/documentreference-zika-info-pdf*​/​.extension[0]​.value​.ofType(CodeableConcept) (l3172​/c14)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.5|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Bundle​.entry[38]​.resource​/*DocumentReference​/documentreference-zika-info-pdf*​/​.category[0]​.coding[0] (l3195​/c12)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
Bundle​.entry[38]​.resource​/*DocumentReference​/documentreference-zika-info-pdf*​/​.category[0] (l3195​/c12)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.4|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Bundle (l1/c2)informationCan't find 'http://statedepartmentofhealth.gov/epi/disease/zika/Supplemental_data_form.pdf' in the bundle (Bundle.entry[36].resource.content[0].attachment.url)
Bundle (l1/c2)informationCan't find 'http://statedepartmentofhealth.gov/epi/diseases/zika/Zika_Virus_Testing_Guidance.pdf' in the bundle (Bundle.entry[37].resource.content[0].attachment.url)
Bundle (l1/c2)informationCan't find 'http://statedepartmentofhealth.gov/epi/disease/zika/outbreakinfo.pdf' in the bundle (Bundle.entry[38].resource.content[0].attachment.url)
Bundle.entry[9].resource (l1097/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[10].resource (l1187/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[11].resource (l1229/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[12].resource (l1274/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[13].resource (l1319/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[14].resource (l1356/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[15].resource (l1426/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[16].resource (l1520/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[17].resource (l1627/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[18].resource (l1709/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[19].resource (l1743/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[20].resource (l1821/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[31].resource (l2668/c8)warningBest Practice Recommendation: In general, all observations should have a performer
Bundle.entry[31].resource (l2668/c8)warningBest Practice Recommendation: In general, all observations should have an effective[x] ()
Bundle.entry[32].resource (l2721/c8)warningBest Practice Recommendation: In general, all observations should have an effective[x] ()

fsh-generated/resources/Condition-condition-common-cold-anon.json Show Validation Information (1)

PathSeverityMessage
Condition (l1/c2)warningConstraint failed: con-3: 'Condition.clinicalStatus SHALL be present if verificationStatus is not entered-in-error and category is problem-list-item' (defined in http://hl7.org/fhir/StructureDefinition/Condition) (Best Practice Recommendation)

fsh-generated/resources/Condition-condition-zika-anon.json Show Validation Information (1)

PathSeverityMessage
Condition (l1/c2)warningConstraint failed: con-3: 'Condition.clinicalStatus SHALL be present if verificationStatus is not entered-in-error and category is problem-list-item' (Best Practice Recommendation)

fsh-generated/resources/DocumentReference-documentreference-add-reporting-needs-pdf.json Show Validation Information (1)

PathSeverityMessage
DocumentReference​.extension[0]​.value​.ofType(CodeableConcept)​.coding[0] (l22​/c8)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
DocumentReference​.extension[0]​.value​.ofType(CodeableConcept) (l22​/c8)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.5|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
DocumentReference​.category[0]​.coding[0] (l45​/c6)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
DocumentReference.category[0] (l45/c6)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.4|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found

fsh-generated/resources/DocumentReference-documentreference-zika-follow-up-pdf.json Show Validation Information (1)

PathSeverityMessage
DocumentReference​.extension[0]​.value​.ofType(CodeableConcept)​.coding[0] (l22​/c8)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
DocumentReference​.extension[0]​.value​.ofType(CodeableConcept) (l22​/c8)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.5|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
DocumentReference​.category[0]​.coding[0] (l45​/c6)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
DocumentReference.category[0] (l45/c6)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.4|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found

fsh-generated/resources/DocumentReference-documentreference-zika-info-pdf.json Show Validation Information (1)

PathSeverityMessage
DocumentReference​.extension[0]​.value​.ofType(CodeableConcept)​.coding[0] (l22​/c8)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
DocumentReference​.extension[0]​.value​.ofType(CodeableConcept) (l22​/c8)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.5|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
DocumentReference​.category[0]​.coding[0] (l45​/c6)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
DocumentReference.category[0] (l45/c6)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.4|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found

fsh-generated/resources/Observation-observation-blood-pressure-anon.json Show Validation Information (3)

PathSeverityMessage
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer

fsh-generated/resources/Observation-observation-calculated-age-anon.json Show Validation Information (10)

PathSeverityMessage
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer

fsh-generated/resources/Observation-observation-country-of-nationality-anon.json Show Validation Information (10)

PathSeverityMessage
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer

fsh-generated/resources/Observation-observation-country-of-residence-anon.json Show Validation Information (10)

PathSeverityMessage
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer

fsh-generated/resources/Observation-observation-disability-status-anon.json Show Validation Information (10)

PathSeverityMessage
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer

fsh-generated/resources/Observation-observation-emergency-outbreak-info-anon.json Show Validation Information (1)

PathSeverityMessage
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer

fsh-generated/resources/Observation-observation-lab-result-lymphocytes-anon.json Show Validation Information (1)

PathSeverityMessage
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer

fsh-generated/resources/Observation-observation-odh-usual-work-anon.json Show Validation Information (10)

PathSeverityMessage
Observation​.value​.ofType(CodeableConcept)​.coding[0] (l58​/c4)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.314' could not be found, so the code cannot be validated
Observation​.value​.ofType(CodeableConcept)​.coding[0] (l60​/c8)Slicing InformationThis element does not match any known slice defined in the profile http://hl7.org/fhir/us/odh/StructureDefinition/odh-UsualWork|1.1.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Observation​.component[0]​.value​.ofType(CodeableConcept)​.coding[0]​.system (l20​/c8)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.315' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Observation​.component[0]​.value​.ofType(CodeableConcept)​.coding[0] (l22​/c12)Slicing InformationThis element does not match any known slice defined in the profile http://hl7.org/fhir/us/odh/StructureDefinition/odh-UsualWork|1.1.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer

fsh-generated/resources/Observation-observation-past-or-present-job-anon.json Show Validation Information (10)

PathSeverityMessage
Observation​.value​.ofType(CodeableConcept)​.coding[0]​.system (l48​/c4)informationA definition for CodeSystem 'http://terminology.hl7.org/CodeSystem/PHOccupationCDCCensus2010' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Observation​.value​.ofType(CodeableConcept)​.coding[0] (l50​/c8)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-past-or-present-job|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Observation​.component[0]​.value​.ofType(CodeableConcept)​.coding[0]​.system (l68​/c8)informationA definition for CodeSystem 'http://terminology.hl7.org/CodeSystem/PHIndustryCDCCensus2010' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Observation​.component[0]​.value​.ofType(CodeableConcept)​.coding[0] (l70​/c12)Slicing InformationThis element does not match any known slice defined in the profile http://fhir.org/fhir/us/anonymized-eicr/StructureDefinition/eicr-anon-past-or-present-job|1.0.0 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer

fsh-generated/resources/Observation-observation-pregnancy-status-anon.json Show Validation Information (5)

PathSeverityMessage
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer

fsh-generated/resources/Observation-observation-rr-relevant-reportable-condition-anon.json Show Validation Information (1)

PathSeverityMessage
Observation.hasMember[0] (l46/c6)Slicing InformationThis element does not match any known slice defined in the profile http://hl7.org/fhir/us/ecr/StructureDefinition/rr-relevant-reportable-condition-observation|2.1.1 (this may not be a problem, but you should check that it's not intended to match a slice) Show Reasoning
Observation (l1/c2)errorSlice 'Observation.hasMember:sliceReportabilityInformationObservation': a matching slice is required, but not found (from http://hl7.org/fhir/us/ecr/StructureDefinition/rr-relevant-reportable-condition-observation|2.1.1). Note that other slices are allowed in addition to this required slice
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have an effective[x] ()

fsh-generated/resources/Observation-observation-rr-reportability-information-anon.json Show Validation Information (1)

PathSeverityMessage
Observation​.extension[0]​.value​.ofType(CodeableConcept)​.coding[0]​.system (l23​/c8)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Observation​.extension[0]​.value​.ofType(CodeableConcept) (l23​/c8)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.3|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Observation​.extension[0]​.value​.ofType(CodeableConcept) (l23​/c8)warningA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated; Unable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.3|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Observation​.extension[0]​.value​.ofType(CodeableConcept)​.coding[0] (l23​/c8)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated
Observation.code.coding[0] (l60/c4)errorA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.274' could not be found, so the code cannot be validated (error because this is a required binding)
Observation.code (l60/c4)warningUnable to check whether the code is in the value set 'http://phinvads.cdc.gov/fhir/ValueSet/2.16.840.1.113883.10.20.15.2.5.6|1' because the code system urn:oid:2.16.840.1.114222.4.5.274 was not found
Observation​.component[0]​.code​.coding[0] (l85​/c8)informationA definition for CodeSystem 'urn:oid:2.16.840.1.114222.4.5.232' could not be found, so the code cannot be validated
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have an effective[x] ()

fsh-generated/resources/Observation-observation-travel-history-201801-anon.json Show Validation Information (10)

PathSeverityMessage
Observation​.component[0]​.value​.ofType(CodeableConcept)​.coding[0]​.system (l30​/c8)informationA definition for CodeSystem 'urn:oid:1.0.3166.1' could not be found, so the code cannot be validated (from http://tx.fhir.org/r4)
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer

fsh-generated/resources/Observation-observation-vaccine-credential-assertion-anon.json Show Validation Information (1)

PathSeverityMessage
Observation (l1/c2)warningBest Practice Recommendation: In general, all observations should have a performer

fsh-generated/resources/StructureDefinition-eicr-anon-caculated-age.json Show Validation Information (1)

PathSeverityMessage
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.human (l1​/c51983)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.expression (l1​/c52119)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.short (l1​/c59561)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.comment (l1​/c60045)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.differential​.element[1]​.constraint[0]​.human (l1​/c136847)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[1]​.constraint[0]​.expression (l1​/c136983)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[5]​.short (l1​/c137744)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk

fsh-generated/resources/StructureDefinition-eicr-anon-composition.json Show Validation Information (1)

PathSeverityMessage
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.human (l1​/c339450)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.expression (l1​/c339586)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.short (l1​/c347026)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.comment (l1​/c347510)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[111]​.constraint[1]​.human (l1​/c492581)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[111]​.constraint[1]​.expression (l1​/c492717)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[120]​.short (l1​/c500699)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[120]​.comment (l1​/c501183)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[134]​.constraint[1]​.human (l1​/c523292)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[134]​.constraint[1]​.expression (l1​/c523428)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[143]​.short (l1​/c531408)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[143]​.comment (l1​/c531892)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[157]​.constraint[1]​.human (l1​/c554321)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[157]​.constraint[1]​.expression (l1​/c554457)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[166]​.short (l1​/c562540)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[166]​.comment (l1​/c563024)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[180]​.constraint[1]​.human (l1​/c585148)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[180]​.constraint[1]​.expression (l1​/c585284)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[189]​.short (l1​/c593189)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[189]​.comment (l1​/c593673)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[211]​.constraint[1]​.human (l1​/c627803)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[211]​.constraint[1]​.expression (l1​/c627939)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[220]​.short (l1​/c635986)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[220]​.comment (l1​/c636470)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[242]​.constraint[1]​.human (l1​/c670898)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[242]​.constraint[1]​.expression (l1​/c671034)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[251]​.short (l1​/c679064)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[251]​.comment (l1​/c679548)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[266]​.constraint[1]​.human (l1​/c703010)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[266]​.constraint[1]​.expression (l1​/c703146)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[275]​.short (l1​/c711072)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[275]​.comment (l1​/c711556)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[297]​.constraint[1]​.human (l1​/c746796)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[297]​.constraint[1]​.expression (l1​/c746932)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[306]​.short (l1​/c754837)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[306]​.comment (l1​/c755321)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[328]​.constraint[1]​.human (l1​/c789782)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[328]​.constraint[1]​.expression (l1​/c789918)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[337]​.short (l1​/c797886)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[337]​.comment (l1​/c798370)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[367]​.constraint[1]​.human (l1​/c844652)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[367]​.constraint[1]​.expression (l1​/c844788)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[376]​.short (l1​/c852753)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[376]​.comment (l1​/c853237)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[399]​.constraint[1]​.human (l1​/c888791)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[399]​.constraint[1]​.expression (l1​/c888927)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[408]​.short (l1​/c896860)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[408]​.comment (l1​/c897344)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[430]​.constraint[1]​.human (l1​/c931852)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[430]​.constraint[1]​.expression (l1​/c931988)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[439]​.short (l1​/c939924)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[439]​.comment (l1​/c940408)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[454]​.constraint[1]​.human (l1​/c963892)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[454]​.constraint[1]​.expression (l1​/c964028)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[463]​.short (l1​/c971975)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[463]​.comment (l1​/c972459)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[487]​.constraint[1]​.human (l1​/c1005609)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[487]​.constraint[1]​.expression (l1​/c1005745)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[496]​.short (l1​/c1013646)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[496]​.comment (l1​/c1014130)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[514]​.constraint[1]​.human (l1​/c1040720)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[514]​.constraint[1]​.expression (l1​/c1040856)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[523]​.short (l1​/c1048857)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[523]​.comment (l1​/c1049341)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[538]​.constraint[1]​.human (l1​/c1073011)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[538]​.constraint[1]​.expression (l1​/c1073147)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[547]​.short (l1​/c1081145)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[547]​.comment (l1​/c1081629)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[562]​.constraint[1]​.human (l1​/c1105163)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[562]​.constraint[1]​.expression (l1​/c1105299)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[571]​.short (l1​/c1113292)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[571]​.comment (l1​/c1113776)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.snapshot​.element[585]​.constraint[1]​.human (l1​/c1136863)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[585]​.constraint[1]​.expression (l1​/c1136999)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[594]​.short (l1​/c1145036)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[594]​.comment (l1​/c1145520)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.differential​.element[1]​.constraint[0]​.human (l1​/c1155712)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[1]​.constraint[0]​.expression (l1​/c1155848)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[5]​.short (l1​/c1156607)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[19]​.constraint[0]​.human (l1​/c1159448)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[19]​.constraint[0]​.expression (l1​/c1159584)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[23]​.short (l1​/c1160515)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[25]​.constraint[0]​.human (l1​/c1160887)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[25]​.constraint[0]​.expression (l1​/c1161023)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[29]​.short (l1​/c1161954)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[31]​.constraint[0]​.human (l1​/c1162353)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[31]​.constraint[0]​.expression (l1​/c1162489)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[35]​.short (l1​/c1163456)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[37]​.constraint[0]​.human (l1​/c1163807)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[37]​.constraint[0]​.expression (l1​/c1163943)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[41]​.short (l1​/c1164846)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[43]​.constraint[0]​.human (l1​/c1165245)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[43]​.constraint[0]​.expression (l1​/c1165381)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[47]​.short (l1​/c1166348)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[49]​.constraint[0]​.human (l1​/c1166738)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[49]​.constraint[0]​.expression (l1​/c1166874)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[53]​.short (l1​/c1167829)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[55]​.constraint[0]​.human (l1​/c1168192)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[55]​.constraint[0]​.expression (l1​/c1168328)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[59]​.short (l1​/c1169247)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[61]​.constraint[0]​.human (l1​/c1169598)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[61]​.constraint[0]​.expression (l1​/c1169734)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[65]​.short (l1​/c1170637)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[67]​.constraint[0]​.human (l1​/c1171012)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[67]​.constraint[0]​.expression (l1​/c1171148)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[71]​.short (l1​/c1172083)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[73]​.constraint[0]​.human (l1​/c1172452)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[73]​.constraint[0]​.expression (l1​/c1172588)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[77]​.short (l1​/c1173515)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[80]​.constraint[0]​.human (l1​/c1174166)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[80]​.constraint[0]​.expression (l1​/c1174302)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[84]​.short (l1​/c1175217)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[86]​.constraint[0]​.human (l1​/c1175577)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[86]​.constraint[0]​.expression (l1​/c1175713)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[90]​.short (l1​/c1176628)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[92]​.constraint[0]​.human (l1​/c1176997)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[92]​.constraint[0]​.expression (l1​/c1177133)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[96]​.short (l1​/c1178060)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[102]​.constraint[0]​.human (l1​/c1179419)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[102]​.constraint[0]​.expression (l1​/c1179555)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[106]​.short (l1​/c1180466)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[109]​.constraint[0]​.human (l1​/c1180980)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[109]​.constraint[0]​.expression (l1​/c1181116)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[113]​.short (l1​/c1182103)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[115]​.constraint[0]​.human (l1​/c1182487)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[115]​.constraint[0]​.expression (l1​/c1182623)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[119]​.short (l1​/c1183570)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[121]​.constraint[0]​.human (l1​/c1183945)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[121]​.constraint[0]​.expression (l1​/c1184081)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[125]​.short (l1​/c1185016)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[127]​.constraint[0]​.human (l1​/c1185442)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[127]​.constraint[0]​.expression (l1​/c1185578)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[131]​.short (l1​/c1186581)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
Composition.extension (l1/c352709)informationThe extension http://hl7.org/fhir/StructureDefinition/composition-clinicaldocument-versionNumber|5.1.0 is deprecated

fsh-generated/resources/StructureDefinition-eicr-anon-encounter.json Show Validation Information (1)

PathSeverityMessage
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.human (l1​/c34854)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.expression (l1​/c34990)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.short (l1​/c42392)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.comment (l1​/c42876)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.differential​.element[0]​.constraint[0]​.human (l1​/c151976)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[0]​.constraint[0]​.expression (l1​/c152112)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[4]​.short (l1​/c152853)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk

fsh-generated/resources/StructureDefinition-eicr-anon-immunization.json Show Validation Information (1)

PathSeverityMessage
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.human (l1​/c31424)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.expression (l1​/c31560)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.short (l1​/c39019)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.comment (l1​/c39503)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.differential​.element[0]​.constraint[0]​.human (l1​/c107101)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[0]​.constraint[0]​.expression (l1​/c107237)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[4]​.short (l1​/c108005)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk

fsh-generated/resources/StructureDefinition-eicr-anon-organization.json Show Validation Information (1)

PathSeverityMessage
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.human (l1​/c55916)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.expression (l1​/c56052)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.short (l1​/c63511)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.comment (l1​/c63995)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.differential​.element[0]​.constraint[0]​.human (l1​/c140292)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[0]​.constraint[0]​.expression (l1​/c140428)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[4]​.short (l1​/c141196)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk

fsh-generated/resources/StructureDefinition-eicr-anon-past-or-present-job.json Show Validation Information (1)

PathSeverityMessage
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.human (l1​/c44855)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.expression (l1​/c44991)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.short (l1​/c52439)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.comment (l1​/c52923)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.differential​.element[0]​.constraint[0]​.human (l1​/c532700)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[0]​.constraint[0]​.expression (l1​/c532836)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[4]​.short (l1​/c533603)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk

fsh-generated/resources/StructureDefinition-eicr-anon-patient.json Show Validation Information (1)

PathSeverityMessage
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.human (l1​/c104909)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.expression (l1​/c105045)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.short (l1​/c112409)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.comment (l1​/c112893)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.differential​.element[0]​.constraint[0]​.human (l1​/c428874)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[0]​.constraint[0]​.expression (l1​/c429010)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[4]​.short (l1​/c429733)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk

fsh-generated/resources/StructureDefinition-eicr-anon-practitioner.json Show Validation Information (1)

PathSeverityMessage
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.human (l1​/c65441)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.expression (l1​/c65577)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.short (l1​/c73036)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.comment (l1​/c73520)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.differential​.element[0]​.constraint[0]​.human (l1​/c160954)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[0]​.constraint[0]​.expression (l1​/c161090)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[4]​.short (l1​/c161858)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk

fsh-generated/resources/StructureDefinition-eicr-anon-practitionerrole.json Show Validation Information (1)

PathSeverityMessage
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.human (l1​/c40694)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.expression (l1​/c40830)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.short (l1​/c48365)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.comment (l1​/c48849)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.differential​.element[0]​.constraint[0]​.human (l1​/c99032)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[0]​.constraint[0]​.expression (l1​/c99168)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[4]​.short (l1​/c99972)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk

fsh-generated/resources/StructureDefinition-eicr-anon-relatedperson.json Show Validation Information (1)

PathSeverityMessage
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.human (l1​/c76530)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[5]​.constraint[1]​.expression (l1​/c76666)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.short (l1​/c84144)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.snapshot​.element[14]​.comment (l1​/c84628)warningThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
StructureDefinition​.differential​.element[0]​.constraint[0]​.human (l1​/c174382)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[0]​.constraint[0]​.expression (l1​/c174518)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
StructureDefinition​.differential​.element[4]​.short (l1​/c175295)informationThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk

Suppressed Messages (Warnings, hints, broken links)

No suppressed messsages

Errors sorted by type


All_observations_should_have_a_performer

fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-blood-pressure-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-calculated-age-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-country-of-nationality-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-country-of-residence-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-disability-status-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-emergency-outbreak-info-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-lab-result-lymphocytes-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-odh-usual-work-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-past-or-present-job-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-pregnancy-status-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-rr-relevant-reportable-condition-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-travel-history-201801-anon.jsonBest Practice Recommendation: In general, all observations should have a performer
fsh-generated/resources/Observation-observation-vaccine-credential-assertion-anon.jsonBest Practice Recommendation: In general, all observations should have a performer

All_observations_should_have_an_effectiveDateTime_or_an_effectivePeriod

fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have an effective[x] ()
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have an effective[x] ()
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have an effective[x] ()
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonBest Practice Recommendation: In general, all observations should have an effective[x] ()
fsh-generated/resources/Observation-observation-rr-relevant-reportable-condition-anon.jsonBest Practice Recommendation: In general, all observations should have an effective[x] ()
fsh-generated/resources/Observation-observation-rr-reportability-information-anon.jsonBest Practice Recommendation: In general, all observations should have an effective[x] ()

Bundle_BUNDLE_Entry_NotFound

fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonCan't find 'http://statedepartmentofhealth.gov/epi/disease/zika/Supplemental_data_form.pdf' in the bundle (Bundle.entry[36].resource.content[0].attachment.url)
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonCan't find 'http://statedepartmentofhealth.gov/epi/diseases/zika/Zika_Virus_Testing_Guidance.pdf' in the bundle (Bundle.entry[37].resource.content[0].attachment.url)
fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonCan't find 'http://statedepartmentofhealth.gov/epi/disease/zika/outbreakinfo.pdf' in the bundle (Bundle.entry[38].resource.content[0].attachment.url)

MSG_DEPENDS_ON_DEPRECATED

fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe extension http://hl7.org/fhir/StructureDefinition/composition-clinicaldocument-versionNumber|5.1.0 is deprecated

SECURITY_STRING_CONTENT_WARNING

fsh-generated/resources/StructureDefinition-eicr-anon-caculated-age.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-caculated-age.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-caculated-age.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-caculated-age.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-caculated-age.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-caculated-age.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-document-bundle.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-document-bundle.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-document-bundle.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-document-bundle.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-encounter.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-encounter.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-encounter.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-encounter.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-encounter.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-encounter.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-immunization.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-immunization.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-immunization.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-immunization.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-immunization.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-immunization.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-organization.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-organization.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-organization.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-organization.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-organization.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-organization.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-past-or-present-job.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-past-or-present-job.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-past-or-present-job.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-past-or-present-job.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-past-or-present-job.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-past-or-present-job.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-patient.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-patient.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-patient.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-patient.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-patient.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-patient.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-practitioner.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-practitioner.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-practitioner.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-practitioner.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-practitioner.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-practitioner.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-practitionerrole.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-practitionerrole.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-practitionerrole.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-practitionerrole.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-practitionerrole.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-practitionerrole.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-relatedperson.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-relatedperson.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-relatedperson.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-relatedperson.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-relatedperson.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk
fsh-generated/resources/StructureDefinition-eicr-anon-relatedperson.jsonThe string value contains text that looks like embedded HTML tags. If this content is rendered to HTML without appropriate post-processing, it may be a security risk

TYPE_SPECIFIC_CHECKS_DT_MARKDOWN_HTML

fsh-generated/resources/StructureDefinition-eicr-anon-caculated-age.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-composition.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-encounter.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-immunization.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-organization.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-past-or-present-job.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-patient.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-practitioner.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-practitionerrole.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour
fsh-generated/resources/StructureDefinition-eicr-anon-relatedperson.jsonThe markdown contains content that appears to be an embedded HTML tag starting at 'Th'. This will (or SHOULD) be escaped by the presentation layer. The content should be checked to confirm that this is the desired behaviour

Validation_VAL_Profile_Minimum_SLICE

fsh-generated/resources/Bundle-bundle-document-zika-anon.jsonSlice 'Observation.hasMember:sliceReportabilityInformationObservation': a matching slice is required, but not found (from http://hl7.org/fhir/us/ecr/StructureDefinition/rr-relevant-reportable-condition-observation|2.1.1). Note that other slices are allowed in addition to this required slice
fsh-generated/resources/Observation-observation-rr-relevant-reportable-condition-anon.jsonSlice 'Observation.hasMember:sliceReportabilityInformationObservation': a matching slice is required, but not found (from http://hl7.org/fhir/us/ecr/StructureDefinition/rr-relevant-reportable-condition-observation|2.1.1). Note that other slices are allowed in addition to this required slice