Tag
webview
Javascript Interface Exposure
Ostorlab's Pentest Engine identified a JavaScript bridge exposure in an Android WebView, allowing unauthenticated native method invocation via deep links. This case study details how the engine bypassed insecure Intent handling to manipulate the native UI, validating a potent social engineering vector while confirming the effectiveness of the underlying sandbox.
Wed 07 January 2026
5 things every mobile security professional should know about WebViews
This article is about WebViews and the security notions we need to have in mind when using these ...
Tue 18 May 2021