Skip to content

Commit

Permalink
docs: add a callout
Browse files Browse the repository at this point in the history
  • Loading branch information
AnnaPS committed Dec 11, 2024
1 parent e9e99b1 commit 95dd6e5
Showing 1 changed file with 7 additions and 0 deletions.
7 changes: 7 additions & 0 deletions src/content/docs/security/security_in_mobile_apps.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -81,6 +81,7 @@ Use Firebase Authentication for a more secure authentication system. You can fin
- [Firebase Authentication](https://firebase.google.com/docs/auth)

Here you have another interesting article that talks about authentication in Flutter.

- [Flutter authentication with Auth0](https://developer.auth0.com/resources/guides/mobile/flutter/basic-authentication/)

More information on _M1: Improper Credential Usage_ [here.](https://owasp.org/www-project-mobile-top-10/2023-risks/m1-improper-credential-usage.html)
Expand Down Expand Up @@ -217,6 +218,12 @@ There are tools like AWS Secrets Manager and Google Cloud Secret Manager that he
- [AWS Secrets Manager video](https://www.youtube.com/watch?v=-9nOyaM3kZk&t=26s)
- [Google Cloud Secret Manager](https://cloud.google.com/secret-manager)

> ❗️**Take into account**
> Tools like **FreeRASP** and **obfuscation** techniques improve application security, they can't guarantee complete protection against cyberattacks. API keys and secrets stored on the client side are always vulnerable to extraction through reverse engineering, among other techniques.

Check warning on line 223 in src/content/docs/security/security_in_mobile_apps.mdx

View workflow job for this annotation

GitHub Actions / build / build

Unknown word (cyberattacks)
> One possible solution for increased security would be to implement a custom backend as it would protect these sensitive keys. This backend would handle API calls securely, keeping secrets hidden from the client.
More information on _M7: Insufficient Binary Protection_ [here.](https://owasp.org/www-project-mobile-top-10/2023-risks/m7-insufficient-binary-protection.html)

- **M8: Security Misconfiguration**: security misconfiguration occurs when mobile apps have improperly configured security settings, permissions, or controls, leading to vulnerabilities and unauthorized access. Threat agents, such as attackers with physical device access or malicious apps, exploit these weaknesses to access sensitive data or execute unauthorized actions within the vulnerable app's context. Proper configuration is crucial to mitigate these risks.
Expand Down

0 comments on commit 95dd6e5

Please sign in to comment.