Steps to reproduce the problem (provide example input):
Unlike the commonmark.js plugin where the option safe: true can be used, the commonmark-java does not offer this option and thus XSS attacks can be done.
example can be as simple as this javascript alert when you add it to the markdown:
[Click this!](javascript:alert('message');)
Expected behavior:
Javascript should be removed from or escaped in the markdown.
Actual behavior:
Javascript will be executed.