-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: owasp mobile top ten security #90
base: main
Are you sure you want to change the base?
Conversation
🥳 Thank you so much! This is a great overview article. When we tell readers what to do, we need to also tell them how to do it. Since a full-blown tutorial and explanation for each section is outside the scope of this overview article, we need to link to tutorials and guides that we've vetted and verified are useful and helpful for mobile developers. I'd say we'd need at least a handful more outbound links to useful technical implementation guides. They don't need to be Flutter-specific. There are also common mistakes we need to draw more attention to with admonitions and highlights. I'm not a security expert by any means, but I do know that humans are the weakest link of the process, and it's probably worth mentioning that and social engineering, even if it's a throw-away reference in a parenthetical. If you don't get the human-side of your organization figured out, no amount of technical best practices matter. And social engineering is an extremely common problem. The other thing I've seen over and over (and seen resistance to improving) is a complete and total abandon for API key security. You covered this in the article, but we need to explain what the alternatives are and link to them. Anything in a front-end website or mobile app just isn't secure because it's available to be inspected/reverse engineered, tampered with, etc. So we need to press that creating microservices that keep the API key to themselves and expose revokable access tokens for front-ends is the best practice (afaik): i.e., we need to highlight the best solution for each class of vulnerabilities (since it's our job to provide opinions). There are other approaches to this problem, too. Unrelated, but you should be able to run |
Thanks for the feedback, @jolexxa ❤️ |
Add a security section that talks about the most common topics and recommendations from the OWASP organization