Filtering ” for XSS [closed]

Saw a weird website today, can any of you please suggest possible XSS payloads for a website that stores user input and sanitizes it in a weird way:

function sanatize(input) {     let count = 0;     let output = '';     for (let i = 0; i < input.length; i++) {         const current = input.charAt(i);         if (current == '<') {             count ++;         }         if (count == 0) {             output += current;         }         if (current == '>') {             count --;         }     }     return output } 

Note that input goes directly into innerHTML tag… that’s why I have a strong intuition that it is vulnerable to XSS