Skip to content

Security: jschof1/pdf2md

Security

SECURITY.md

Security Policy

Reporting a Vulnerability

If you discover a security vulnerability in pdf2md, please report it privately:

Please do not file a public GitHub issue for security vulnerabilities.

Scope

pdf2md is a local CLI tool. It:

  • Reads PDF files from your local filesystem
  • Sends extracted text to the Google Gemini API (when AI mode is enabled)
  • Writes Markdown output to your local filesystem

What is in scope

  • Command injection vulnerabilities
  • API key exposure
  • File path traversal
  • Unsafe temp file handling

What is not in scope

  • Google Gemini API security (report to Google)
  • PyMuPDF vulnerabilities (report to the PyMuPDF project)

Best Practices

  • Never commit your GEMINI_API_KEY to source control
  • Be cautious when processing untrusted PDFs — malformed PDFs can exploit parser bugs in PyMuPDF
  • Review the extracted text before sharing, as it may contain sensitive information

There aren't any published security advisories