Security fixes are provided for the latest stable versions of Markdrop:
| Version | Support Status |
|---|---|
| 0.2.x | ✔ Actively supported |
| < 0.2 | ❌ No longer supported |
We strongly recommend using the newest version to receive security updates.
We take security seriously and appreciate responsible disclosure.
Warning
Please do NOT report vulnerabilities in public GitHub issues.
If you believe you've found a security issue, please report it privately via:
- Email:
dev.markdrop@proton.me - GitHub Security Advisory: Use the private reporting feature here: Report a vulnerability
To help us verify and fix the issue promptly, please provide (when possible):
- A clear description of the vulnerability
- Steps to reproduce
- Affected files, code paths, or commit references
- Impact and severity assessment
- Proof of concept (if available)
We appreciate detailed reports, but even partial information is useful.
We aim to:
- Acknowledge your report within 72 hours
- Provide an initial assessment within 7–10 days
- Release a fix as soon as it is verified and tested
Delays may occur depending on complexity, severity, or contributor availability.
- Please allow us adequate time to fix the issue before public disclosure.
- We will credit security researchers unless anonymity is requested.
- After a fix is released, a GitHub Security Advisory will be published.
- Markdrop uses HTML-enabled markdown processing (Remark / Rehype).
- Potential XSS vectors are sanitized, but users should avoid rendering untrusted markdown without additional validation.
- All file processing happens client-side.
- Markdrop does not store uploaded files on any backend.
- Users should validate and trust the content they upload or share.
- Markdrop relies on multiple open-source libraries.
- We update dependencies regularly but cannot guarantee zero vulnerabilities in all upstream packages.
- Running
npm auditor similar tools is encouraged for deployments.
If you self-host or extend Markdrop:
- Keep your deployment updated.
- Sanitize any markdown generated or imported from untrusted sources.
- Serve the app over HTTPS.
- Apply restrictive Content Security Policy (CSP) headers.
- Review permissions and API keys if using Supabase or other integrations.
Security fixes and announcements will be shared through:
- GitHub Security Advisories
- Release notes
- Changelog entries
For any security-related concerns, please reach out privately via the contact methods above.
Thank you for helping keep Markdrop secure for everyone!