Conversation

Replying to and
Yeah allowing side-loading of JAR/DEX and DSO is traditionally abused by malware/spyware. Notice that all .so paths ara data assets and not apk assets. Hopefully Google will restrict it soon as announced with DexClassLoader improvements.
1
2
Replying to and
That's definitely a way to try and close it, but I'm unsure it's the best approach. Personally, I think this just speaks to the over permissioning of bloated apps. Somehow sandboxing the webview outside of an APK would also be an interest approach to reduce this attack surface
1
2
If apps package their libraries properly they get mapped directly from the apk (modern way, which minimizes storage usage and offers the best security for verified boot / attestation) or extracted by the package manager with the app unable to write to it (apk data, not app data).
1
Show replies