Conversation

Replying to and
Yeah allowing side-loading of JAR/DEX and DSO is traditionally abused by malware/spyware. Notice that all .so paths ara data assets and not apk assets. Hopefully Google will restrict it soon as announced with DexClassLoader improvements.
1
2
Replying to and
That's definitely a way to try and close it, but I'm unsure it's the best approach. Personally, I think this just speaks to the over permissioning of bloated apps. Somehow sandboxing the webview outside of an APK would also be an interest approach to reduce this attack surface
1
2
Replying to and
The renderer runs in a sandbox but apps can grant the web content access to files. In the past, GrapheneOS has disabled the ability to execute executables and libraries from app data with an exception system and Android is moving towards that without having exceptions upstream.
1
Show replies