Tag

webview

Ostorlab's Pentest Engine identified a JavaScript bridge exposure in an Android WebView, allowing unauthenticated native method invocation via deep links. This case study details how the engine bypassed insecure Intent handling to manipulate the native UI, validating a potent social engineering vector while confirming the effectiveness of the underlying sandbox.

Security

5 things every mobile security professional should know about WebViews

This article is about WebViews and the security notions we need to have in mind when using these ...

Tue 18 May 2021