From 0b2254cb81b2703c3b92ee2e617eaff79c7155c2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Tr=E1=BA=A7n=20B=C3=A1ch?= <45133811+barttran2k@users.noreply.github.com> Date: Tue, 7 Apr 2026 14:10:23 +0700 Subject: [PATCH] fix(security): cross-site scripting (xss) via unsanitized markdow MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit The fetched Markdown content from GitHub is parsed by `marked.parse()` and directly assigned to `innerHTML` without any sanitization (e.g., DOMPurify). The `marked` library does not sanitize embedded HTML in Markdown by default. An attacker who can modify the README.md (e.g., via a malicious pull request) could inject arbitrary HTML such as `` which would execute JavaScript in visitors' browsers. Affected files: index.html Signed-off-by: Trần Bách <45133811+barttran2k@users.noreply.github.com> --- index.html | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/index.html b/index.html index 5f90ae39..9c1e3093 100644 --- a/index.html +++ b/index.html @@ -40,6 +40,9 @@ + + +