-
_[Below are comments sent in by email. Author details below.]_
-------
There are consistent points of emphasis from our review that have material impact on achieving the goals set forth in the r…
-
When a user performs various options (logging in, authorizing apps, etc), that info is stored to a log. The user should be able to view their log of activities.
-
### Finding Description
ASLR/PIC protection is not implemented for certain components of the binary package.
ASLR (Address space layout randomization) is a security feature introduced in Android that…
-
### Finding Description
The application is vulnerable to the Janus exploit. This would allow malicious actors to possibly inject their own code into the binary package and release it as a legitimate …
-
### Finding Description
The application is vulnerable to the Janus exploit. This would allow malicious actors to possibly inject their own code into the binary package and release it as a legitimate …
-
### Finding Description
Stack smashing protection has not been implemented in components included in the application. When an application is compiled with stack smashing protection, a known value or …
-
### Finding Description
The application is vulnerable to the Janus exploit. This would allow malicious actors to possibly inject their own code into the binary package and release it as a legitimate …
-
### Finding Description
ASLR/PIC protection is not implemented for certain components of the binary package.
ASLR (Address space layout randomization) is a security feature introduced in Android that…
-
https://github.com/Open-Security-Working-Group/paper-what-makes-hardened-container-image/blob/562013517b8a8851bf9dade9337be9886c8c22a7/Planning-Outline_What-makes-hardened-container-images.adoc#L101
…
-
### Finding Description
Stack smashing protection has not been implemented in components included in the application. When an application is compiled with stack smashing protection, a known value or …