Content Policy & Transparency
PageDrop automatically scans every upload to protect users from phishing, malware, and abuse. We believe in full transparency about what we block and why.
Blocked Patterns
The following categories of content are automatically blocked during upload. Each pattern targets a specific attack vector while keeping false positives near zero.
External Form Submissions
HTML forms that submit data to external servers. This is the primary vector for credential-harvesting phishing pages that impersonate login screens.
Credential Exfiltration
Scripts that send captured data to Telegram bots, Discord webhooks, or other external endpoints commonly used to exfiltrate stolen credentials.
Camera & Microphone Access
Pages requesting getUserMedia access to capture audio or video from visitors without legitimate reason. Prevents surveillance and snooping attacks.
WebGL Crash Payloads
Malicious WebGL shaders or rendering loops designed to crash browsers or freeze devices. Prevents denial-of-service attacks against visitors.
Redirect Abuse
Pages that immediately redirect visitors to external malicious sites. Prevents PageDrop URLs from being used as redirect laundering for spam or phishing campaigns.
Crypto Wallet Scams
Pages impersonating cryptocurrency wallets, fake token sales, or wallet-drainer scripts that trick users into connecting their wallets and signing malicious transactions.
Brand Impersonation
Pages that replicate login screens or branding of major services (Google, Microsoft, banks) combined with credential collection forms.
Obfuscated Code
Heavily obfuscated JavaScript designed to hide malicious intent. Legitimate minified code is not affected — only patterns consistent with intentional obfuscation to evade detection.
Moderation Stats
A snapshot of PageDrop content moderation activity. These numbers are updated periodically.
Appeal Process
If you believe your content was incorrectly rejected, you can appeal the decision.
How to Appeal a False Positive
- Review the error message returned by the API — it identifies which pattern triggered the block.
- Check the blocked patterns list above to understand what was detected.
- If you believe the rejection was incorrect, modify your HTML to avoid the flagged pattern and re-upload.
- If the issue persists, open a GitHub issue at
github.com/softvoyagers/pagedrop-apiwith the subject "False Positive Appeal" and include your HTML content (or a minimal reproduction).
GET /api/v1/content-policy. This endpoint returns the full list of blocked patterns with their descriptions, which you can use to pre-validate content before uploading.