Skip to content

Security: Third-party JavaScript loaded from CDN without version pinning or SRI#638

Closed
tomaioo wants to merge 1 commit intooffa:masterfrom
tomaioo:contribai/fix/security/third-party-javascript-loaded-from-cdn-w
Closed

Security: Third-party JavaScript loaded from CDN without version pinning or SRI#638
tomaioo wants to merge 1 commit intooffa:masterfrom
tomaioo:contribai/fix/security/third-party-javascript-loaded-from-cdn-w

Conversation

@tomaioo
Copy link
Copy Markdown

@tomaioo tomaioo commented Apr 10, 2026

Summary

Security: Third-party JavaScript loaded from CDN without version pinning or SRI

Problem

Severity: High | File: index.html:L39

External scripts are loaded from jsDelivr without Subresource Integrity (integrity + crossorigin) and at least one URL is not version-pinned (marked.min.js). If the CDN or dependency supply chain is compromised, malicious JavaScript can be executed in clients.

Solution

Pin exact dependency versions in script URLs and add SRI hashes. Prefer self-hosting vetted copies for stronger supply-chain control.

Changes

  • index.html (modified)

Testing

  • Existing tests pass
  • Manual review completed
  • No new warnings/errors introduced

External scripts are loaded from jsDelivr without Subresource Integrity (`integrity` + `crossorigin`) and at least one URL is not version-pinned (`marked.min.js`). If the CDN or dependency supply chain is compromised, malicious JavaScript can be executed in clients.

Affected files: index.html

Signed-off-by: tomaioo <203048277+tomaioo@users.noreply.github.com>
@offa offa added the duplicate label Apr 10, 2026
@offa
Copy link
Copy Markdown
Owner

offa commented Apr 10, 2026

Duplicate of #625 and #628.

@offa offa closed this Apr 10, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants