Open omhmichaels opened 2 years ago
Hi people. Before anything can be done in a serious way, we need to take out all easy methods that can be used to hack wallets, before going in deep. Thats why i suggest removing the Copy To Clipboard option in all private key or key that can be used to import wallet, because if you copy to clipboard, some websites can get the content. Reference: https://stackoverflow.com/questions/6413036/get-current-clipboard-content https://caniuse.com/?search=clipboardData
Copy to clipboard, and i think taking screenshots are potential attack vectors. Before anything can be done those have to be mitigated.
Description
Two members of our community have reached out on talk.harmony.one about having large amounts of one taken. Harmony is launching a vulnerability assessment and analysis of Chrome One Wallet Extensions attack surface.
Context
Timeline
Acceptance Criteria
**The following must be completed with a report of findings including steps to reproduce. The scope of the assessment done as well as any findings should be clearly described and any should be demonstrated clearly.
Artifact/Lead Collection
Gather and Document Artifacts:
Leads from conversations with harmony devs and the individuals involved for documentation:
Other artifacts:
Applications Security Info Gathering Credential Generation/Storage
[] How does the application generate the seed phrase and private key?
[] How and where does the application store the seed phrase and private key?
[] Where does wallet/application stores sensitive data, how are they stored?
[] Does the application enforce a strong password policy?
Areas of interest: Potential UaF, CSRF, CRLF or [Bruteforce Bypass]() Addition Brute Force TOTP 2fa Info
Networking
Source Code Analysis
Web Application Vulnerability Assesments
Web Application Security Testing
Test Network Infrastructure Configuration
Authentication Testing
Authorization Testing
Session Management Testing
Web Security Testing
Business Logic Testing
Client-side Testing
Web Security Testing
Reward
TBD...
Additional References
Andriod Wallet Security Paper: andriod-wallet-security.pdf
OWASP Application Security Verification Standard 4.0.3-en.pdf
OWASP Web App Security Testing Guide
Tools
ZAP Attack Proxy
Potential Resources For Incident Respons or related DAO's:
Incident-Response_Initial-Prep.pdf
IR-handbook.pdf
NOTES
RESOURCES
APP SOURCE CODE