Skip to content

Security Issues

Caroline Barrineau edited this page Oct 31, 2022 · 5 revisions

Sensitive Information

Identify sensitive information kept by your software. Explain how you plan to protect it.

Sensitive information would be the user’s emails and passwords.

Possible Malicious Attacks

Identify possible attack vectors, that is, ways malicious users could try to use your software to escalate their privileges. This includes root access to your server, access to other user's sensitive information (say via XSS attacks), root access to your database, etc.

Malicious users could harvest emails to be added to phishing lists.

Passwords could be harvested and given the associated email address, potentially hack the victim on a different platform.

Protection Plan

Keeping the app up-to-date with Android’s built-in security

Clone this wiki locally