drophere.cc
Instant static hosting for AI agents and developers.
drophere.cc lets you upload static files via a 3-step flow and get a live URL back in seconds. It's designed so AI agents (Claude, Cursor, etc.) can publish HTML, images, and other static assets programmatically.
Agent/User API R2 Storage
| | |
| 1. POST /api/v1/artifact | (file manifest) |
| ────────────────────────>| |
| <──── slug + upload URLs | |
| | |
| 2. PUT files to upload URLs |
| ────────────────────────>| stream to R2 ──────────────>|
| | |
| 3. POST /api/v1/artifact/:slug/finalize |
| ────────────────────────>| copy unchanged files ──────>|
| <──── live URL | |Step 1 — Create: Send a file manifest (paths, sizes, content types). Get back a unique slug and upload URLs.
Step 2 — Upload: PUT each file to its upload URL. The API streams the body directly to R2 storage.
Step 3 — Finalize: Tell the API you're done. It activates the artifact and returns a live URL like bold-canvas-a7k2.drophere.cc.
For updates, only changed files need to be re-uploaded (hash-based incremental deploys).
Base URL
https://drophere.cc
All endpoints return JSON. Authenticated endpoints require an Authorization: Bearer <api_key> header.
Agent-readable docs
If you're an agent or script, prefer the Markdown API reference instead of this HTML page:
https://drophere.cc/skill/references/API.md
For a compact machine-readable index first, fetch https://drophere.cc/api/v1/skill/docs. It returns capability groups plus markdownDocsUrl and htmlDocsUrl.
Installation
Claude Code Skill (recommended for AI agents)
# macOS / Linux
curl -fsSL https://drophere.cc/install.sh | bash
# Windows
irm https://drophere.cc/install.ps1 | iex
Then tell your agent: "publish this to drophere.cc"
Direct API usage
No SDK required. All operations are standard HTTP requests with JSON bodies. Use curl, fetch, or any HTTP client.
Quickstart
Publish a single HTML file in three commands. No account required.
1. Create an artifact
curl -X POST https://drophere.cc/api/v1/artifact -H "Content-Type: application/json" -d '{
"files": [
{ "path": "index.html", "size": 45, "contentType": "text/html" }
]
}'
{
"slug": "bold-canvas-a7k2",
"versionId": "550e8400-e29b-41d4-a716-446655440000",
"siteUrl": "https://bold-canvas-a7k2.drophere.cc/",
"uploads": [
{
"path": "index.html",
"method": "PUT",
"url": "https://drophere.cc/api/v1/upload/bold-canvas-a7k2/550e84.../index.html",
"headers": { "Content-Type": "text/html" }
}
],
"expiresAt": "2026-03-13T10:00:00Z",
"limits": { "maxFileSize": 104857600, "maxArtifactSize": 262144000 },
"feedback": "https://drophere.cc/api/v1/feedback",
"claimToken": "a1b2c3d4...64chars"
}
2. Upload the file
curl -X PUT "UPLOAD_URL_FROM_STEP_1" -H "Content-Type: text/html" --data-binary '<h1>Hello from drophere.cc</h1>'
3. Finalize
curl -X POST https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/finalize -H "Content-Type: application/json" -d '{
"versionId": "550e8400-e29b-41d4-a716-446655440000",
"claimToken": "a1b2c3d4...64chars"
}'
{
"slug": "bold-canvas-a7k2",
"versionId": "550e8400-e29b-41d4-a716-446655440000",
"siteUrl": "https://bold-canvas-a7k2.drophere.cc/",
"expiresAt": "2026-03-13T10:00:00Z",
"feedback": "https://drophere.cc/api/v1/feedback"
}
Your site is now live at bold-canvas-a7k2.drophere.cc. Anonymous uploads expire after 24 hours. Authenticate to make them permanent.
Save the claimToken. It's the only way to update or finalize anonymous artifacts. It cannot be recovered.
Authentication
drophere.cc uses magic link authentication. Request a verification code via email, exchange it for a permanent API key, then use the API key as a Bearer token for all authenticated requests.
Getting an API key
1. Request a code
curl -X POST https://drophere.cc/api/auth/agent/request-code -H "Content-Type: application/json" -d '{ "email": "you@example.com" }'
{
"success": true,
"requiresCodeEntry": true,
"expiresAt": "2026-03-12T10:15:00Z"
}
A code in XXXX-XXXX format is sent to your email. Codes expire after 15 minutes.
Rate Limit 1 request per email per 60 seconds.
2. Verify the code
curl -X POST https://drophere.cc/api/auth/agent/verify-code -H "Content-Type: application/json" -d '{ "email": "you@example.com", "code": "ABCD-EFGH" }'
{
"success": true,
"email": "you@example.com",
"apiKey": "a1b2c3d4e5f6...64chars",
"isNewUser": true
}
The code is single-use and deleted on successful verification. The apiKey is permanent — store it securely.
3. Use the API key
Include the API key as a Bearer token in subsequent requests:
curl https://drophere.cc/api/v1/artifacts -H "Authorization: Bearer a1b2c3d4e5f6...64chars"
API key storage priority
If you're using the Claude Code skill, the API key is resolved in this order:
--api-keyflagDROPHERE_API_KEYenvironment variable- Credential file at
~/.drophere/credentials
Rotating your API key
If your key leaks, you can self-serve rotate it. The fastest path is the Rotate key button on drophere.cc/account. To do it programmatically:
curl -X POST https://drophere.cc/api/v1/me/api-key/rotate -H "Authorization: Bearer <current_key>"
{
"apiKey": "<new 64-hex key>",
"message": "API key rotated. All clients using the old key will start returning 401..."
}
The endpoint atomically replaces the key, fires a confirmation email to the account address (best-effort), and returns the new key in the response. The old key starts returning 401 immediately on every authenticated endpoint and on the MCP surfaces (/mcp, /mcp/<apiKey>).
Rate-limited to 5 rotations/hour/user. Not exposed via MCP — agents can't rotate their own credentials and lock you out.
Recovery if an attacker rotated first: re-run the magic-link flow (request-code → verify-code). The verify endpoint returns whatever key is currently in the database; rotate again from /account with that key. The magic-link channel is gated on email control, so the attacker can't follow.
Billing
Free Token includes API and MCP access, unlimited 24-hour artifacts, and 10 persistent artifacts. Unlimited unlocks unlimited persistent artifacts. Secure unlocks access control, password protection, collaboration, service variables, and custom domains.
Plans
No Auth
{
"plans": [
{ "id": "unlimited", "price": "$4.99/month" },
{ "id": "secure", "price": "$9.99/month" }
]
}
Status
{
"plan": "free_token",
"usage": { "persistentArtifacts": 3, "persistentArtifactLimit": 10 },
"features": { "apiAndMcp": true, "secureAccessControls": false },
"upgradeOptions": [{ "plan": "unlimited", "checkoutEndpoint": "/api/v1/billing/checkout" }]
}
Checkout
curl -X POST https://drophere.cc/api/v1/billing/checkout -H "Content-Type: application/json" -H "Authorization: Bearer YOUR_API_KEY" -d '{ "plan": "secure" }'
Creates a Stripe Checkout Session for unlimited or secure. Agents should call this only after explicit user confirmation.
Portal
Creates a Stripe billing portal session for the authenticated account.
Paywall errors
Paid-feature gates return HTTP 402 with a structured PAYWALL response. Agents should present agentMessage, ask the human whether to upgrade, and create checkout only if the human confirms.
{
"error": "PAYWALL",
"code": "PLAN_REQUIRED",
"requiredPlan": "secure",
"agentMessage": "The collaboration feature requires the secure plan. Upgrade to secure ($9.99/month) at https://drophere.cc/account?upgrade=secure.",
"upgrade": { "checkoutEndpoint": "/api/v1/billing/checkout" },
"retry": { "action": "collaboration" }
}
Create Artifact
Start a new artifact upload. Send a file manifest and receive upload URLs.
Auth Optional Anonymous uploads (no auth) get a 24-hour TTL and a claimToken.
Request body
| Field | Type | Required | Description |
|---|---|---|---|
files | FileManifest[] | Yes | Array of file entries. Must be non-empty. |
files[].path | string | Yes | Relative file path. Must not contain .. |
files[].size | number | Yes | Exact file size in bytes |
files[].contentType | string | Yes | MIME type (e.g., text/html) |
files[].hash | string | No | SHA-256 hash for incremental deploys |
ttlSeconds | number | No | Custom TTL (authenticated only). Anonymous is always 24h. |
viewer | object | No | {title?, description?, ogImagePath?} for auto-viewer |
source | string | No | Origin identifier (e.g., cli, browser, api). Also read from x-drophere-client header. Max 100 chars. |
curl -X POST https://drophere.cc/api/v1/artifact -H "Content-Type: application/json" -H "Authorization: Bearer YOUR_API_KEY" -d '{
"files": [
{ "path": "index.html", "size": 2048, "contentType": "text/html", "hash": "sha256:abc123..." },
{ "path": "style.css", "size": 512, "contentType": "text/css", "hash": "sha256:def456..." }
],
"viewer": {
"title": "My Project",
"description": "A demo page"
}
}'
{
"slug": "bold-canvas-a7k2",
"versionId": "550e8400-e29b-41d4-a716-446655440000",
"siteUrl": "https://bold-canvas-a7k2.drophere.cc/",
"expiresAt": null,
"uploads": [
{
"path": "index.html",
"method": "PUT",
"url": "https://drophere.cc/api/v1/upload/bold-canvas-a7k2/550e84.../index.html",
"headers": { "Content-Type": "text/html" }
},
{
"path": "style.css",
"method": "PUT",
"url": "https://drophere.cc/api/v1/upload/bold-canvas-a7k2/550e84.../style.css",
"headers": { "Content-Type": "text/css" }
}
],
"limits": {
"maxFileSize": 1073741824,
"maxArtifactSize": 5368709120
},
"feedback": "https://drophere.cc/api/v1/feedback"
}
uploads— upload URLs (10-minute window). Upload each file withPUT.claimToken— only returned for anonymous uploads. Store it to update/finalize later.expiresAt—nullfor authenticated uploads without a TTL.limits— current size limits so clients can pre-validate.feedback— URL for submitting feedback about the service.
Rate Limit Authenticated: 60 creates/hour. Anonymous: 5 creates/hour per IP.
Errors
| Status | Error |
|---|---|
400 | Invalid file manifest (missing fields, .. in path, empty array) |
413 | File or total artifact size exceeds limit |
429 | Rate limit exceeded |
Upload Files
Upload each file to the URL returned in the uploads array. The API streams the body to R2 storage.
curl -X PUT "UPLOAD_URL_FROM_CREATE" -H "Content-Type: text/html" --data-binary @index.html
{
"ok": true,
"path": "index.html"
}
- Set the
Content-Typeheader as specified in the upload entry'sheaders - Upload URLs expire after 10 minutes
- If
Content-Lengthis present, it must not exceed the declared file size in the manifest - Upload all files before calling finalize
Upload URLs are time-limited. Complete all uploads within 10 minutes of creating the artifact.
Finalize Artifact
Mark an upload as complete. This activates the artifact and makes it accessible at its URL. For incremental deploys, unchanged files are copied server-side during finalization.
Authenticated Requires Bearer token or claimToken in body for anonymous artifacts.
Request body
| Field | Type | Required | Description |
|---|---|---|---|
versionId | string | Yes | Must match the versionId from create/update |
claimToken | string | No | Required for anonymous artifacts |
curl -X POST https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/finalize -H "Content-Type: application/json" -H "Authorization: Bearer YOUR_API_KEY" -d '{ "versionId": "550e8400-e29b-41d4-a716-446655440000" }'
{
"slug": "bold-canvas-a7k2",
"versionId": "550e8400-e29b-41d4-a716-446655440000",
"siteUrl": "https://bold-canvas-a7k2.drophere.cc/",
"expiresAt": null,
"feedback": "https://drophere.cc/api/v1/feedback"
}
Errors
| Status | Error |
|---|---|
400 | versionId is required |
401 | Authentication required |
403 | Invalid or missing claim token / not the artifact owner |
404 | Artifact or version not found |
409 | versionId does not match pending version |
Update Artifact (Incremental Deploy)
Update an existing artifact. Files with matching SHA-256 hashes are skipped — no re-upload needed. Only changed or new files get upload URLs.
Authenticated Requires Bearer token or claimToken in body.
Request body
| Field | Type | Required | Description |
|---|---|---|---|
files | FileManifest[] | Yes | New file manifest with hashes for comparison |
claimToken | string | No | Required for anonymous artifacts |
curl -X PUT https://drophere.cc/api/v1/artifact/bold-canvas-a7k2 -H "Content-Type: application/json" -H "Authorization: Bearer YOUR_API_KEY" -d '{
"files": [
{ "path": "index.html", "size": 3072, "contentType": "text/html", "hash": "sha256:new123..." },
{ "path": "style.css", "size": 512, "contentType": "text/css", "hash": "sha256:def456..." }
]
}'
{
"slug": "bold-canvas-a7k2",
"versionId": "660e8400-e29b-41d4-a716-446655440001",
"siteUrl": "https://bold-canvas-a7k2.drophere.cc/",
"uploads": [
{
"path": "index.html",
"method": "PUT",
"url": "https://drophere.cc/api/v1/upload/bold-canvas-a7k2/660e84.../index.html",
"headers": { "Content-Type": "text/html" }
}
],
"skipped": [
{ "path": "style.css", "hash": "sha256:def456..." }
],
"limits": { "maxFileSize": 1073741824, "maxArtifactSize": 5368709120 },
"feedback": "https://drophere.cc/api/v1/feedback"
}
- Only files in
uploadsneed to be uploaded - Files in
skippedmatched by hash and will be copied server-side during finalize - After uploading changed files, finalize the new version
Errors
| Status | Error |
|---|---|
403 | Invalid claim token or not the artifact owner |
404 | Artifact not found |
410 | Artifact has expired |
413 | File or total artifact size exceeds limit |
Claim Artifact
Transfer an anonymous artifact to your authenticated account. This removes the 24-hour expiry and the claim token, making the artifact permanent.
Authenticated
curl -X POST https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/claim -H "Content-Type: application/json" -H "Authorization: Bearer YOUR_API_KEY" -d '{ "claimToken": "a1b2c3d4...64chars" }'
{
"slug": "bold-canvas-a7k2",
"siteUrl": "https://bold-canvas-a7k2.drophere.cc/",
"message": "Artifact claimed successfully"
}
Claiming is idempotent — calling it again on an already-claimed artifact is a no-op.
Get Artifact
Retrieve details for a specific artifact, including its current files.
Authenticated Must own the artifact.
curl https://drophere.cc/api/v1/artifact/bold-canvas-a7k2 -H "Authorization: Bearer YOUR_API_KEY"
{
"slug": "bold-canvas-a7k2",
"siteUrl": "https://bold-canvas-a7k2.drophere.cc/",
"status": "active",
"currentVersionId": "550e8400-e29b-41d4-a716-446655440000",
"pendingVersionId": null,
"collaboration": {
"enabled": false,
"commentPolicy": "authenticated",
"commentDomain": null,
"commentAllowedEmails": null
},
"viewerMetadata": null,
"expiresAt": null,
"createdAt": "2026-03-12T10:00:00Z",
"updatedAt": "2026-03-12T10:01:00Z",
"files": [
{
"path": "index.html",
"size": 2048,
"contentType": "text/html",
"hash": "sha256:abc123..."
}
]
}
List Artifacts
List all artifacts owned by the authenticated user.
Authenticated
curl https://drophere.cc/api/v1/artifacts -H "Authorization: Bearer YOUR_API_KEY"
{
"artifacts": [
{
"slug": "bold-canvas-a7k2",
"siteUrl": "https://bold-canvas-a7k2.drophere.cc/",
"status": "active",
"currentVersionId": "550e8400-...",
"pendingVersionId": null,
"collaboration": {
"enabled": false,
"commentPolicy": "authenticated",
"commentDomain": null,
"commentAllowedEmails": null
},
"viewerMetadata": { "title": "My Project" },
"title": "My Project",
"expiresAt": null,
"updatedAt": "2026-03-12T10:01:00Z"
}
]
}
viewerMetadata is the full JSON blob set via the metadata endpoint (null when unset). title is a convenience extraction of viewerMetadata.title (trimmed; null when missing or empty) so list consumers don't have to dig. collaboration is included so owners and agents can discover whether the comment layer is enabled before calling the comment APIs.
Update Viewer Metadata
Update the title, description, or OG image for auto-viewer rendering. This metadata has no effect if the artifact contains an index.html or is a single HTML file — in both cases the HTML is served directly and its own <head> tags are authoritative.
Authenticated
curl -X PATCH https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/metadata -H "Content-Type: application/json" -H "Authorization: Bearer YOUR_API_KEY" -d '{
"viewerMetadata": {
"title": "Project Gallery",
"description": "Screenshots from v2 launch",
"ogImagePath": "hero.png"
}
}'
{
"slug": "bold-canvas-a7k2",
"viewerMetadata": {
"title": "Project Gallery",
"description": "Screenshots from v2 launch",
"ogImagePath": "hero.png"
},
"note": "Viewer metadata updated successfully."
}
Delete Artifact
Permanently delete an artifact and all its versions. Files are removed from R2 storage in the background.
Authenticated Must own the artifact.
curl -X DELETE https://drophere.cc/api/v1/artifact/bold-canvas-a7k2 -H "Authorization: Bearer YOUR_API_KEY"
{
"slug": "bold-canvas-a7k2",
"message": "Artifact deleted"
}
Password Protection
Protect an artifact with a password. Simpler alternative to email-based access control. Visitors see a password form; correct entry sets a 30-day session cookie.
Set or remove password
Authenticated Must own the artifact.
Request body
| Field | Type | Required | Description |
|---|---|---|---|
password | string or null | Yes | 8-128 chars to set, null to remove |
# Set a password
curl -X PATCH https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/password \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{ "password": "my-secret-123" }'
{
"slug": "bold-canvas-a7k2",
"passwordProtected": true
}
# Remove password
curl -X PATCH https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/password \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{ "password": null }'
Security: Passwords are stored as bcrypt hashes (cost factor 10). Changing or removing a password invalidates all existing sessions. Password attempts are rate-limited to 10/minute/IP.
Password protection is checked before email-allowlist access control. Both can be active simultaneously.
Collaboration
Enable an isolated reader-style highlight and comment layer on HTML artifacts. Artifact visibility, passwords, and email gates still control who can view the artifact; the collaboration comment policy controls who can write comments.
Enable or disable collaboration
Authenticated Must own the artifact.
| Field | Type | Required | Description |
|---|---|---|---|
enabled | boolean | Yes | Enable or hide the collaboration layer. |
commentPolicy | string | No | authenticated, anyone, same_domain, or specific_accounts. |
commentDomain | string or null | No | Required for same_domain unless inferred from the owner's non-consumer email domain. |
commentAllowedEmails | string[] or null | No | Required for specific_accounts. These must be Drophere account emails. |
curl -X PATCH https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/collaboration \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{ "enabled": true }'
{
"slug": "bold-canvas-a7k2",
"collaborationEnabled": true,
"commentPolicy": "authenticated",
"commentDomain": null,
"commentAllowedEmails": null
}
Set view and comment permissions atomically
Authenticated Must own the artifact. This endpoint validates view access and comment settings before writing, updates both together, and returns the persisted readback.
curl -X PATCH https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/permissions \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{
"access": { "visibility": "public" },
"collaboration": {
"enabled": true,
"commentPolicy": "specific_accounts",
"commentAllowedEmails": ["alice@example.com"]
}
}'
{
"slug": "bold-canvas-a7k2",
"access": {
"visibility": "public",
"allowedEmails": null,
"allowedDomains": null
},
"collaboration": {
"enabled": true,
"commentPolicy": "specific_accounts",
"commentDomain": null,
"commentAllowedEmails": ["alice@example.com"]
}
}
Read comments
Authenticated Owner Bearer token. Viewer UI uses the isolated Drophere frame after artifact access is granted. Query parameter status may be open, resolved, or all. settings.viewer.canComment and each thread's capabilities.canReply reflect the current viewer's comment policy eligibility.
curl https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/comments?status=open \
-H "Authorization: Bearer YOUR_API_KEY"
Comment actions
curl -X PATCH https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/comments/THREAD_ID \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{ "status": "resolved" }'
Viewer commenting runs through an isolated Drophere-controlled frame using a short-lived HttpOnly access cookie. The frame can create threads, reply, paste image attachments, and delete the viewer's own messages when the artifact gates and comment policy allow it. Artifact JavaScript does not receive comment bodies or private author metadata. Owner and agent APIs receive private author metadata; viewer responses redact email and user IDs. Attachments are validated and served through artifact gates rather than direct public bucket URLs.
Agents should prefer the MCP tools for parity: drophere_set_collaboration, drophere_list_comments, drophere_add_comment, drophere_update_comment, and drophere_delete_comment.
GET /api/v1/artifact/:slug/annotations and PATCH /api/v1/artifact/:slug/annotations/:id remain as temporary owner-only compatibility aliases backed by comment threads.
Duplicate Artifact
Create a server-side copy of an artifact with a new slug. Files are copied within R2 — no re-upload needed.
Authenticated Must own the source artifact.
curl -X POST https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/duplicate \
-H "Authorization: Bearer YOUR_API_KEY"
{
"slug": "calm-reef-x9z1",
"sourceSlug": "bold-canvas-a7k2",
"versionId": "550e8400-e29b-41d4-a716-446655440000",
"siteUrl": "https://calm-reef-x9z1.drophere.cc/",
"files": 12
}
The duplicate does NOT copy: password, access control settings, TTL/expiry, domain links, or claim token. The new artifact starts as public with no expiry.
Rate Limit Same as artifact creation (60/hour authenticated).
Refresh Upload URLs
Re-issue upload URLs for a pending version when the original 10-minute window expires. Only returns URLs for files not yet uploaded.
Auth Optional Authenticated via Bearer token, or anonymous via claimToken in body.
curl -X POST https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/uploads/refresh \
-H "Authorization: Bearer YOUR_API_KEY"
{
"slug": "bold-canvas-a7k2",
"versionId": "550e8400-e29b-41d4-a716-446655440000",
"uploads": [
{
"path": "app.js",
"method": "PUT",
"url": "https://drophere.cc/api/v1/upload/...",
"headers": { "Content-Type": "application/javascript" }
}
],
"alreadyUploaded": ["index.html", "style.css"],
"expiresIn": 600
}
- Only works when a pending (unfinalized) version exists
- Resets the 10-minute upload window
- Files already in R2 are listed in
alreadyUploadedand skipped
Access Control
Restrict who can view an artifact by email address or email domain. By default, all artifacts are public.
Set Visibility
Authenticated Must own the artifact.
Request body
| Field | Type | Required | Description |
|---|---|---|---|
visibility | string | Yes | "public" or "restricted" |
allowedEmails | string[] | No | Up to 100 email addresses |
allowedDomains | string[] | No | Up to 20 domain names |
curl -X PATCH https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/access -H "Content-Type: application/json" -H "Authorization: Bearer YOUR_API_KEY" -d '{
"visibility": "restricted",
"allowedEmails": ["alice@acme.com", "bob@acme.com"],
"allowedDomains": ["acme.com"]
}'
{
"slug": "bold-canvas-a7k2",
"visibility": "restricted",
"allowedEmails": ["alice@acme.com", "bob@acme.com"],
"allowedDomains": ["acme.com"]
}
To make public again, set visibility to "public" — this clears all allowlists.
Consumer domains are blocked. You cannot use gmail.com, outlook.com, yahoo.com, hotmail.com, icloud.com, aol.com, protonmail.com, or proton.me as allowed domains. Use specific email addresses instead.
When visibility is "restricted", at least one email or domain must be provided.
Errors
| Status | Error |
|---|---|
400 | Invalid visibility, email, or domain format |
400 | Consumer domain blocked |
400 | At least one email or domain required for restricted |
403 | Not the artifact owner |
404 | Artifact not found |
410 | Artifact has expired |
Get Access Control
Authenticated Must own the artifact.
curl https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/access -H "Authorization: Bearer YOUR_API_KEY"
{
"slug": "bold-canvas-a7k2",
"visibility": "restricted",
"allowedEmails": ["alice@acme.com"],
"allowedDomains": ["acme.com"]
}
Visitor Authentication
Visitors to restricted artifacts verify their email via a one-time code. After verification, a session cookie (dh_visitor) is set on .drophere.cc for 30 days.
Request visitor code
No Auth
curl -X POST https://drophere.cc/api/v1/visitor/request-code -H "Content-Type: application/json" -d '{ "email": "alice@acme.com", "slug": "bold-canvas-a7k2" }'
{
"success": true,
"expiresIn": 900
}
Timing-safe response. If the email is not on the allowlist, the endpoint still returns 200 but does not send a code. This prevents probing which emails have access.
Verify visitor code
curl -X POST https://drophere.cc/api/v1/visitor/verify-code -H "Content-Type: application/json" -d '{ "email": "alice@acme.com", "code": "ABCD-EFGH", "slug": "bold-canvas-a7k2" }'
{
"success": true,
"email": "alice@acme.com"
}
Sets a dh_visitor cookie (30-day TTL, HttpOnly, Secure, SameSite=None).
URL Structure
Every artifact gets a unique subdomain URL. You can also serve artifacts via handles and custom domains.
| Pattern | Resolution |
|---|---|
{slug}.drophere.cc | Direct artifact access |
{handle}.drophere.cc | Handle root link |
{handle}.drophere.cc/{location} | Longest prefix match against handle's links |
{custom-domain}/{location} | Same as handle but for custom domain |
Handles
Handles give you a custom subdomain: yourname.drophere.cc. Combine with links to map paths to different artifacts.
Claim handle
Authenticated
curl -X POST https://drophere.cc/api/v1/handle -H "Content-Type: application/json" -H "Authorization: Bearer YOUR_API_KEY" -d '{ "handle": "alice" }'
{
"handle": "alice",
"hostname": "alice.drophere.cc",
"namespace_id": "user-uuid"
}
Validation: 2-30 chars, lowercase alphanumeric + hyphens, no leading/trailing hyphens.
Reserved handles: admin, api, www, help, blog, docs, app, dashboard, settings, account, login, signup, auth, status, support.
Errors
| Status | Error |
|---|---|
400 | Invalid handle format |
409 | You already have a handle / Handle is already taken |
Get handle
Authenticated
curl https://drophere.cc/api/v1/handle -H "Authorization: Bearer YOUR_API_KEY"
{
"handle": "alice",
"hostname": "alice.drophere.cc",
"namespace_id": "user-uuid",
"links": [
{ "location": "", "slug": "bold-canvas-a7k2" },
{ "location": "blog", "slug": "quiet-river-b3m1" }
]
}
Change handle
Authenticated
curl -X PATCH https://drophere.cc/api/v1/handle -H "Content-Type: application/json" -H "Authorization: Bearer YOUR_API_KEY" -d '{ "handle": "new-name" }'
{
"handle": "new-name",
"hostname": "new-name.drophere.cc"
}
Release handle
Authenticated
Deletes the handle, its KV entry, and all associated links.
curl -X DELETE https://drophere.cc/api/v1/handle -H "Authorization: Bearer YOUR_API_KEY"
{
"success": true
}
Custom Domains
Serve artifacts from your own domain. Register the domain, add a DNS record, then create links to route paths to artifacts.
Add domain
Authenticated
curl -X POST https://drophere.cc/api/v1/domains -H "Content-Type: application/json" -H "Authorization: Bearer YOUR_API_KEY" -d '{ "domain": "docs.example.com" }'
{
"domain": "docs.example.com",
"status": "pending",
"dns_instructions": {
"type": "CNAME",
"name": "docs.example.com",
"value": "fallback.drophere.cc",
"note": "Add a CNAME record pointing docs.example.com to fallback.drophere.cc. If this is an apex domain, use an ALIAS record instead."
}
}
DNS setup: Add a CNAME record pointing your domain to fallback.drophere.cc. For apex domains (e.g., example.com), use an ALIAS record if your DNS provider supports it.
List domains
Authenticated
curl https://drophere.cc/api/v1/domains -H "Authorization: Bearer YOUR_API_KEY"
{
"domains": [
{
"domain": "docs.example.com",
"status": "active",
"ssl_status": "active",
"created_at": "2026-03-11T10:00:00Z",
"links": [
{ "location": "", "slug": "bold-canvas-a7k2" }
]
}
]
}
Get domain
Authenticated
Delete domain
Authenticated
Removes the domain and all its associated links. KV entries are cleaned up.
curl -X DELETE https://drophere.cc/api/v1/domains/docs.example.com -H "Authorization: Bearer YOUR_API_KEY"
{
"success": true
}
Links
Links route URL paths on your handle or custom domain to specific artifacts. For example, alice.drophere.cc/blog can point to a different artifact than alice.drophere.cc/portfolio.
Create link
Authenticated
| Field | Type | Required | Description |
|---|---|---|---|
location | string | Yes | URL path segment (e.g., blog, docs). Empty string for root. |
slug | string | Yes | Target artifact slug |
domain | string | No | Custom domain. If omitted, uses your handle. |
curl -X POST https://drophere.cc/api/v1/links -H "Content-Type: application/json" -H "Authorization: Bearer YOUR_API_KEY" -d '{ "location": "blog", "slug": "quiet-river-b3m1" }'
{
"namespace": "alice",
"location": "blog",
"slug": "quiet-river-b3m1"
}
Creating a link with the same namespace + location upserts (updates the existing link).
List links
Authenticated
curl https://drophere.cc/api/v1/links -H "Authorization: Bearer YOUR_API_KEY"
{
"links": [
{
"location": "blog",
"slug": "quiet-river-b3m1",
"namespace": "alice",
"namespaceType": "handle"
}
]
}
Get link
Authenticated Use __root__ for the root location.
Update link
Authenticated
curl -X PATCH https://drophere.cc/api/v1/links/blog -H "Content-Type: application/json" -H "Authorization: Bearer YOUR_API_KEY" -d '{ "slug": "new-blog-slug" }'
{
"success": true
}
Delete link
Authenticated Optional query param ?domain=example.com for domain-scoped links.
curl -X DELETE https://drophere.cc/api/v1/links/blog -H "Authorization: Bearer YOUR_API_KEY"
{
"success": true
}
Key-Value Store
Per-artifact key-value storage, accessible from the artifact's own origin. No authentication required — designed for public read/write from hosted apps (e.g., game leaderboards, user preferences, shared state).
All store endpoints are served from the artifact's subdomain:
https://{slug}.drophere.cc/_api/store/
Also works via handles and custom domains.
Key validation
Keys must match: ^[a-zA-Z0-9._-:/]{1,480}$
Valid: score, game.level-1_data, leaderboard/level:1
Invalid: empty string, spaces, ../etc/passwd, unicode, keys > 480 chars
CORS
All store responses include CORS headers. OPTIONS requests return 204 with preflight support.
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: GET, PUT, DELETE, OPTIONS
Access-Control-Allow-Headers: Content-Type, x-rate-limit-bypass
Get Value
No Auth Rate Limit 300 reads/min per IP per artifact.
curl https://bold-canvas-a7k2.drophere.cc/_api/store/leaderboard
{
"value": [{ "name": "Alice", "score": 100 }],
"metadata": { "updatedAt": "2026-03-13T10:00:00Z" }
}
Errors
| Status | Code | Description |
|---|---|---|
404 | KEY_NOT_FOUND | Key does not exist |
429 | RATE_LIMITED | Rate limit exceeded |
Put Value
No Auth Rate Limit 30 writes/min per IP per artifact.
curl -X PUT https://bold-canvas-a7k2.drophere.cc/_api/store/leaderboard -H "Content-Type: application/json" -d '[{ "name": "Alice", "score": 100 }]'
Body must be valid JSON, max 100 KB.
{
"ok": true,
"key": "leaderboard"
}
Errors
| Status | Code | Description |
|---|---|---|
400 | INVALID_KEY | Key fails validation |
400 | VALUE_TOO_LARGE | Body exceeds 100 KB |
400 | INVALID_JSON | Body is not valid JSON |
400 | INVALID_CONTENT_TYPE | Missing Content-Type: application/json |
429 | RATE_LIMITED | Rate limit exceeded |
Delete Value
No Auth Rate Limit 30 writes/min per IP per artifact.
curl -X DELETE https://bold-canvas-a7k2.drophere.cc/_api/store/leaderboard
{
"ok": true
}
List Keys
No Auth Rate Limit 30 requests/min (write tier).
Optional query parameter: ?cursor=... for pagination.
curl https://bold-canvas-a7k2.drophere.cc/_api/store
{
"keys": [
{
"name": "leaderboard",
"metadata": { "updatedAt": "2026-03-13T10:00:00Z" }
}
],
"cursor": null
}
Returns up to 1000 keys per page. If cursor is not null, pass it as ?cursor=... for the next page.
Service Variables
Encrypted server-side storage for API keys and secrets. Used by proxy routes to inject auth headers into upstream API calls. Values are encrypted at rest (AES-256-GCM) and never returned via the API.
- Max 50 variables per account
- Max 4 KB per value
- Names: alphanumeric + underscores, 1-64 chars (
/^[A-Za-z0-9_]{1,64}$/) - Optional
allowedUpstreamsrestricts which domains can receive the variable
Create or update variable
Authenticated
| Field | Type | Required | Description |
|---|---|---|---|
value | string | Yes | The secret value (max 4 KB) |
allowedUpstreams | string[] | No | Domain names this variable can be sent to |
curl -X PUT https://drophere.cc/api/v1/me/variables/OPENAI_KEY \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{
"value": "sk-abc123...",
"allowedUpstreams": ["api.openai.com"]
}'
{
"name": "OPENAI_KEY",
"allowedUpstreams": ["api.openai.com"],
"message": "Variable created"
}
allowedUpstreams is a security feature. When set, proxy routes will refuse to inject this variable into requests to non-matching upstream domains. This prevents accidental credential leakage if a manifest is misconfigured.
List variables
Authenticated
curl https://drophere.cc/api/v1/me/variables \
-H "Authorization: Bearer YOUR_API_KEY"
{
"variables": [
{
"name": "OPENAI_KEY",
"allowedUpstreams": ["api.openai.com"],
"createdAt": "2026-03-12T10:00:00Z",
"updatedAt": "2026-03-12T10:00:00Z"
}
]
}
Values are never included in the response. Only names and metadata are returned.
Delete variable
Authenticated
curl -X DELETE https://drophere.cc/api/v1/me/variables/OPENAI_KEY \
-H "Authorization: Bearer YOUR_API_KEY"
{
"name": "OPENAI_KEY",
"message": "Variable deleted"
}
Proxy Routes
Let your static sites call authenticated APIs without exposing credentials in client code. Deploy a .drophere/proxy.json manifest with your artifact, and the edge worker forwards requests from /_proxy/* paths to upstream APIs with injected auth headers.
Browser JS Edge Worker Upstream API
| | |
| fetch(/_proxy/api/chat) | |
| ───────────────────────────>| |
| | Load .drophere/proxy.json |
| | Decrypt ${OPENAI_KEY} |
| | |
| | fetch(upstream, {headers}) |
| | ───────────────────────────>|
| | <── response (streamed) |
| <── proxied response | |Manifest format
Include .drophere/proxy.json in your artifact's files:
{
"routes": {
"/api/chat": {
"upstream": "https://api.openai.com/v1/chat/completions",
"headers": { "Authorization": "Bearer ${OPENAI_KEY}" }
},
"/api/db/*": {
"upstream": "https://db.example.com/api",
"headers": { "apikey": "${DB_KEY}" },
"rateLimit": "20/hour/ip"
}
}
}
Route matching
- Exact match:
/api/chatmatches only/_proxy/api/chat - Wildcard:
/api/db/*matches/_proxy/api/db/anything— remaining path appended to upstream URL - Max 20 routes per manifest
Variable resolution
${VAR_NAME} references in headers are resolved from your service variables at request time. Variables are decrypted server-side — client code never sees credentials.
Security
upstreammust use HTTPS — HTTP is rejectedSet-Cookieheaders from upstream are stripped- Only
Content-TypeandAcceptheaders forwarded from client allowedUpstreamson variables enforced — variable rejected if upstream domain doesn't match- Max request body: 10 MB
Rate limiting
Default: 100 requests/hour/IP per route. Override per route with "rateLimit": "20/hour/ip". Format: {count}/{second|minute|hour}/ip.
Client usage
From your deployed static site's JavaScript:
// Call an authenticated API without exposing your key
const res = await fetch('/_proxy/api/chat', {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify({
model: 'gpt-4',
messages: [{ role: 'user', content: 'Hello' }]
})
});
const data = await res.json();
SSE streaming works transparently. If the upstream returns Content-Type: text/event-stream, the proxy streams the response without buffering — ideal for LLM chat interfaces.
MCP Server
drophere.cc speaks the Model Context Protocol natively. Point any MCP-capable client (Claude Desktop, Cursor, custom agents) at the server and it can publish, update, claim, password-protect, route, and delete artifacts — plus read and write the KV store and service variables — without you wiring up REST calls.
The MCP surface is a thin wrapper over the same authenticated REST API documented above. Anything an agent can do over REST it can do over MCP, with one deliberate exception: API-key rotation is not exposed, so a compromised agent can't lock you out of your own account.
Connect
Two equivalent transport forms, depending on whether your client can send custom headers:
Path-token form
API key embedded in the URL path. Useful for clients that don't expose a way to set Authorization headers (some agent UIs, simple HTTP MCP bridges). Treat the URL itself as the secret — anyone with it can act as you.
Bearer-header form
Standard MCP endpoint. Authenticate with Authorization: Bearer <apiKey>. Preferred form when your client supports it (key isn't logged in URLs / proxies / browser history).
Authenticated Same 64-hex API key you get from magic-link verification. Missing, malformed (not 64 hex chars), or revoked keys return 401.
Example: Claude Desktop config
{
"mcpServers": {
"drophere": {
"url": "https://drophere.cc/mcp",
"headers": {
"Authorization": "Bearer YOUR_API_KEY"
}
}
}
}
CORS
OPTIONS preflight is open (*). Allowed methods: GET, POST, OPTIONS. Allowed headers: Authorization, Content-Type, mcp-session-id. Preflight is cached 24 hours.
Tools
The server registers the tools below. Parameter schemas mirror the corresponding REST endpoints — each tool links to the relevant section for full request/response details.
Search & fetch
drophere_search— search your own artifacts by slug, title, or sourcedrophere_fetch— fetch a hosted file's content by URL (useful for letting an agent read back what it just published)
Artifacts — read
drophere_list_artifacts— see List Artifactsdrophere_get_artifact— see Get Artifactdrophere_get_artifact_access— see Get Access
Artifacts — write
drophere_create_artifact— see Createdrophere_update_artifact— see Update (Incremental)drophere_finalize_artifact— see Finalizedrophere_claim_artifact— see Claimdrophere_duplicate_artifact— see Duplicatedrophere_refresh_uploads— see Refresh Upload URLsdrophere_update_artifact_metadata— see Metadatadrophere_set_artifact_access— see Set Visibilitydrophere_set_artifact_password/drophere_unset_artifact_password— see Password Protection
Collaboration
drophere_set_collaboration— see Collaborationdrophere_list_comments,drophere_add_comment,drophere_update_comment,drophere_delete_comment— see Collaboration
Upload
drophere_upload_file— wraps the file upload proxy. The tool takes a slug + version + path + base64 content and writes to R2 in one call (no separate signed-URL step).
Handles & links
drophere_set_handle,drophere_get_handle,drophere_delete_handle— see Handlesdrophere_set_link,drophere_get_link,drophere_list_links,drophere_delete_link— see Links
Service variables
drophere_set_variable,drophere_list_variables,drophere_delete_variable— see Service Variables
Key-Value store
drophere_kv_get,drophere_kv_set,drophere_kv_list,drophere_kv_delete— see Key-Value Store
Delete
drophere_delete_artifact— see Delete Artifact
Not exposed via MCP: POST /api/v1/me/api-key/rotate. Rotation is deliberately gated to direct API / web calls so an agent that misbehaves can't trade your existing key for a new one.
Rate Limits
MCP shares the same per-user buckets as the underlying REST endpoints — the wrapper doesn't add or subtract budget. In practice this means: 60 creates/hour, 5 key rotations/hour (REST-only), 30 writes/min and 300 reads/min on the KV store, 10 feedback submissions/hour. See Limits for the full table.
On top of those, the MCP transport itself applies a lightweight per-key throttle to absorb runaway agent loops — sustained traffic above a few requests/second will see 429. Back off and retry.
Slack
The @drophere Slack bot turns any HTML file you drop into Slack into a live URL. Mention the bot with an attachment, DM it, or use the Host on drophere message shortcut — it uploads the file, hosts it, and replies in-thread with the URL.
Slack-hosted artifacts are anonymous — they aren't linked to your drophere.cc account, even if you have one. By default they're restricted to your workspace's email domains (configured server-side); pass --public to drop the restriction.
Install
The bot is currently invite-only while we tune the workspace flow. Reach out via feedback with your Slack workspace name to request access.
Once installed, the bot exposes:
- The
@dropheremention in any channel it's invited to - Direct messages (DMs and group DMs)
- A message shortcut labelled Host on drophere
Usage
1. @-mention in a channel
Attach an HTML file and mention the bot:
@drophere here you go
[attach: report.html]
The bot replies in-thread:
Dropped! Your file is live:
https://bold-canvas-a7k2.drophere.cc/
File: report.html
To make the artifact public (no domain restriction), add --public anywhere in the message:
@drophere ship this --public
[attach: landing.html]
2. DM the bot
Send an HTML attachment directly to @drophere in a DM or group DM. Same response. The --public flag works here too.
3. Message shortcut
On any Slack message that already has an HTML attachment, open the message actions menu (…) and pick Host on drophere. Useful for re-hosting a file a teammate posted earlier without needing to mention the bot.
The shortcut always hosts with the default workspace-domain restriction — there's no --public form. If you need a public URL, re-share with an @-mention instead.
Supported files: single HTML file per message (.html, .htm, or MIME text/html). Other file types are ignored. Size cap matches the anonymous upload limit.
Webhook Endpoints
For completeness — these are the URLs Slack itself calls into drophere.cc. They aren't part of the public API; you don't call them directly.
Slack Events API target. Handles url_verification (during app setup), app_mention, and DM/group-DM message events. Requests are authenticated via X-Slack-Signature (HMAC-SHA256 of the timestamp + raw body, keyed by the Slack signing secret) and deduplicated on X-Slack-Retry-Num.
Slack Interactivity target. Handles the drophere_host message shortcut (callback_id). Same signature scheme as /api/slack/events.
Content Serving
Artifacts are served at https://{slug}.drophere.cc/. The edge worker handles routing, access control, and file serving from R2 storage.
File serving priority
For a given request path against an artifact:
- Password gate — if password-protected, verify session cookie or show password form
- Access control — if restricted, verify email/session
- Proxy intercept —
/_proxy/*requests forwarded via proxy routes - Root path with
index.htmlin manifest — serve the HTML file - Root path with a single HTML file (not named
index.html) — serve it directly as the entry point - Exact file match in the version manifest
- Directory index: try
{path}/index.html - SPA fallback — if
spaModeenabled, serveindex.htmlfor unmatched paths - No match — 404
SPA Routing
When spaMode: true is set in viewer metadata, unmatched paths serve index.html instead of returning 404. This enables client-side routing for React, Vue, SvelteKit, and other SPA frameworks.
# Enable SPA mode
curl -X PATCH https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/metadata \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{ "viewerMetadata": { "spaMode": true } }'
- Static assets (JS, CSS, images) are still served normally — they match before the SPA fallback
/_api/*and/_proxy/*paths are never intercepted- Requires an
index.htmlin the artifact's root
Response headers
Files are served with:
Content-Type— from R2 metadata or file extension detectionCache-Control: public, max-age=3600, s-maxage=86400for public artifactsCache-Control: private, no-storefor restricted artifactsETag— from R2 object metadata
Visit Counter
Drop-in counter for any artifact. The script reads four metrics from a same-origin endpoint and writes the raw number into every matching element. No styling, no formatting — wrap and style however you like.
Usage
<p><span data-drophere-visits="total">—</span> visits</p>
<p><span data-drophere-visits="today">—</span> today</p>
<script src="https://drophere.cc/c/visits.js" defer></script>
The data-drophere-visits attribute selects which metric to inject. Any element type works — span, div, strong, etc. Multiple elements with the same metric are all filled from a single fetch.
Endpoint
Same-origin JSON endpoint. Resolves the artifact from the Host header. Inherits the artifact's password and access-control gates — restricted artifacts return 401/403 to non-allowed visitors.
Response
{
"total": 12483,
"today": 142,
"last7d": 1109,
"unique7d": 734
}
| Field | Description |
|---|---|
total | Lifetime visits across all time. |
today | Visits since 00:00 UTC today. |
last7d | Visits in the rolling 7-day window. |
unique7d | Approximate unique visitors in the last 7 days. Visitor identity is a daily-rotating IP+secret hash for privacy, so a returning visitor on different days is counted more than once. |
Cached at the edge for 30–60 seconds.
Programmatic access
Owner-only equivalent of the same-origin endpoint, for fetching counts from outside the artifact (e.g. a dashboard). Returns the same JSON shape.
curl -H "Authorization: Bearer $DROPHERE_API_KEY" \
https://drophere.cc/api/v1/artifact/bold-canvas-a7k2/visits
Auto-Viewers
When an artifact has no index.html, drophere.cc renders a viewer based on the content type. This gives rich previews for images, PDFs, videos, and more.
| Content | Viewer | Features |
|---|---|---|
| Single image | Image viewer | Centered, responsive, dark background, og:image meta |
| Multiple images | Gallery | Lightbox with thumbnail grid and navigation |
| Single PDF | PDF viewer | Embedded PDF.js renderer |
| Single video | Video player | HTML5 <video> with controls |
| Single audio | Audio player | HTML5 <audio> with controls |
| Text, JSON, YAML, XML, JS, TS, TOML | Text viewer | Monospace, syntax-highlighted |
| Mixed files | Directory listing | File tree with icons, sizes, and download links |
Auto-viewers include og:title, og:description, and og:image meta tags when viewerMetadata is set.
Download as Markdown
Off by default. Agents can enable Download-as-Markdown per artifact at creation time (or later via a metadata update). When enabled, drophere runs the artifact's HTML through a converter and returns a .md file suitable for RAG pipelines, agent ingestion, and offline reading. This is best-effort.
Scope
Works on: user-uploaded HTML artifacts (served at {slug}.drophere.cc or a custom domain) where the agent has opted in (see below), including direct file paths and auto-viewer wrappers.
Does not apply to: the drophere marketing site (drophere.cc), developer docs (docs.drophere.cc), skill/install endpoints, API responses, the password gate, or non-HTML artifacts (images, PDFs, videos, JSON). Those are either not user content or not HTML, so the button is not injected and ?format=md does not apply.
Enabling the feature
The feature is gated by the viewer.markdownDownload flag in the artifact's viewer metadata. When it is true, the ?format=md endpoint and the floating .md button both become available. When it is missing or false, ?format=md returns 404 and no button is injected.
At creation time — pass viewer.markdownDownload: true in the Create Artifact body:
POST /api/v1/artifact
Content-Type: application/json
{
"files": [...],
"viewer": { "markdownDownload": true }
}
On an existing artifact — update the viewer metadata via PATCH (requires auth; must own the artifact):
PATCH /api/v1/artifact/{slug}/metadata
Authorization: Bearer <token>
Content-Type: application/json
{
"viewerMetadata": { "markdownDownload": true }
}
To turn off a previously-enabled artifact, send PATCH /metadata with { "viewerMetadata": { "markdownDownload": false } }.
How to trigger
Both mechanisms below only work when markdownDownload is enabled on the artifact. Otherwise the URL returns 404 and the button is not injected.
- Query parameter: append
?format=mdto any artifact URL. - Floating button: HTML responses from MD-enabled artifacts are injected with a small
.mdbutton in the bottom-right corner that clicks through to the same URL with?format=md. - Alternate link: MD-enabled HTML responses also include
<link rel="alternate" type="text/markdown" href="?format=md">in<head>for NO-JS and CSP-strict clients.
# Download the rendered index.html as Markdown (artifact must have markdownDownload: true)
curl -L "https://bold-canvas-a7k2.drophere.cc/?format=md" > page.md
# Works for any HTML file path on an MD-enabled artifact
curl -L "https://bold-canvas-a7k2.drophere.cc/docs/guide.html?format=md" > guide.md
The button is only injected on top-level navigations (Sec-Fetch-Dest: document or absent). Iframe, object, and embed fetches never get the button.
Response
Content-Type: text/markdown; charset=utf-8Content-Disposition: attachment; filename="{slug}.md"Cache-Control: public, max-age=3600, s-maxage=86400for public artifacts;private, no-storefor password-protected or access-controlled artifacts.
If the source file is already Markdown (.md, .markdown, or text/markdown), it is served verbatim with attachment headers — no conversion.
Limits
- Size cap: 2 MB of HTML input. Larger files return
413 Payload Too Large. - Content type: only
text/htmlsources are converted. Files withtext/markdownor a.md/.markdownextension are served verbatim as attachments (no conversion). All other content types return415 Unsupported Media Type. - Rate limit: 30 conversions per IP per minute per slug. Excess requests get
429with aRetry-Afterheader. - Auth inheritance:
?format=mdrespects the same password, expiry, and access-control gates as the underlying page. Restricted artifacts require the same auth as the HTML version.
Error codes
| Code | Meaning |
|---|---|
404 | Artifact does not have markdownDownload enabled, or source file does not exist. |
413 | HTML exceeds the 2 MB conversion cap. |
415 | Source is not HTML or Markdown (e.g. an image or binary file). |
429 | Rate limit exceeded (30/min per IP per slug). |
Limits
Upload size limits
| Per file | Per artifact (total) | |
|---|---|---|
| Anonymous | 100 MB | 250 MB |
| Authenticated | 1 GB | 5 GB |
Exceeding a limit returns 413 with error, details, and limits fields.
File count limits
| Max files per artifact | |
|---|---|
| Anonymous | 100 |
| Authenticated | 500 |
Rate limits
| Operation | Limit | Window | Scope |
|---|---|---|---|
| Create artifact (anonymous) | 5 | 1 hour | Per IP |
| Create artifact (authenticated) | 60 | 1 hour | Per user |
| Request auth code | 1 | 60 seconds | Per email |
| Request visitor code | 1 | 60 seconds | Per email + slug |
| Submit feedback | 10 | 1 hour | Per IP |
| Store reads | 300 | 1 minute | Per IP per artifact |
| Store writes | 30 | 1 minute | Per IP per artifact |
| Proxy routes (default) | 100 | 1 hour | Per IP per route |
| Password attempts | 10 | 1 minute | Per IP per slug |
Rate-limited requests return 429.
TTL and expiry
| Resource | TTL |
|---|---|
| Anonymous artifacts | 24 hours (fixed) |
| Authenticated artifacts | Indefinite (or custom ttlSeconds) |
| Upload URLs | 10 minutes |
| Auth codes | 15 minutes |
| Visitor codes | 15 minutes |
| Visitor sessions | 30 days |
| Password sessions | 30 days |
| Store values | 1 year |
| Idempotency keys | 24 hours |
Errors
All errors return a consistent JSON format:
{
"error": "Human-readable error message",
"details": "Optional additional context"
}
Status codes
| Code | Meaning |
|---|---|
200 | Success |
201 | Resource created |
400 | Bad request — invalid input or validation error |
401 | Authentication required or API key invalid |
403 | Forbidden — authenticated but not the owner or invalid claim token |
404 | Resource not found |
409 | Conflict — duplicate slug, handle taken, version mismatch |
410 | Gone — artifact has expired |
413 | Payload too large — file or artifact size limit exceeded |
429 | Rate limit exceeded |
503 | Service temporarily unavailable |
Feedback
Submit feedback about drophere.cc. No authentication required.
No Auth Rate Limit 10 per hour per IP.
| Field | Type | Required | Description |
|---|---|---|---|
message | string | Yes | 1-2000 characters |
slug | string | No | Related artifact slug (max 100 chars) |
source | string | No | Where feedback came from (e.g., skill, api) |
curl -X POST https://drophere.cc/api/v1/feedback -H "Content-Type: application/json" -d '{
"message": "Upload URL expired before upload finished",
"slug": "bold-canvas-a7k2",
"source": "skill"
}'
{
"received": true
}
Capability Discovery
Agents can discover available API capabilities without reinstalling the skill. The endpoint returns a compact index of feature groups, related endpoints, and links to the Markdown and HTML docs.
No Auth
curl https://drophere.cc/api/v1/skill/docs
{
"version": "0.3.0",
"capabilities": [
{
"name": "publish",
"summary": "Upload static files to the web instantly",
"endpoints": ["..."]
},
{
"name": "collaboration",
"summary": "Enable anchored comments, replies, moderation, and attachments",
"endpoints": ["..."]
}
],
"docsUrl": "https://drophere.cc/skill/references/API.md",
"markdownDocsUrl": "https://drophere.cc/skill/references/API.md",
"htmlDocsUrl": "https://docs.drophere.cc/"
}
Cached for 1 hour (Cache-Control: public, max-age=3600).
Health Check
No Auth
curl https://drophere.cc/api/health
{
"status": "ok",
"timestamp": "2026-03-12T10:00:00Z"
}
drophere.cc — Instant static hosting for AI agents.