Okay, it is all coming back to me now. This is a problem with OpenACS, not the src attribute. If I was smart, I would just send a tempting email to all the admins:
Hey X,
Check out this link on XSS: http://example.com/XSS.html
Then construct my unchecked src attriute on XSS.html
It seems the agreed upon solution is to require a tie between the form and the form processing script, and to require POST. I would add an 'I'm a human' test to certain actions as well.
Jeff, you once provided great links to open source tools for generating images to read, but I wasn't sure if the intent was to point out they are easily broken?? The nonce idea (or any tying method) would mostly eliminate simple attacks since it would require more than one request, but I'm starting to think that you could do something like
src="http://example.com/get-nonce"
src="http://example.com/use-nonce"
That is, two images loaded in sequence. At the very least I have noticed that Mozilla serializes frame source loading.