By trusting all HTML, toastr bypasses the XSS protection provided by angular:
if (options.allowHtml) {
toast.scope.allowHtml = true;
toast.scope.title = $sce.trustAsHtml(map.title);
toast.scope.message = $sce.trustAsHtml(map.message);
I think it is not toastr's place to assert that arbitrary HTML is safe for direct inclusion in the DOM.
(this actually gave rise to an XSS vulnerability in one of our applications)