oasis-wallet-web
oasis-wallet-web copied to clipboard
2021-07 audit: top-level issue
please mark all issues found during this audit as blocking this one. this issue will not be marked as complete until all blockers are resolved (fixed or deferred, etc).
things to look for:
- identify potential attack surfaces -- e.g., user input (can users attack anything other than their own account?), unauthenticated JS loading, server auth / MITM potentials (web proxy to futz with messages), not all are nec'y valid
- input validation -- data types, value ranges, regex matching/filtering, XSS, SQLi, etc; how are errors handled/reported?
- unexpected event ordering / state transitions -- what are the sources of events? are event-order validation needed?
(please edit to add general pointers/topics).
As far as I can tell, all issues marked as blocking this one has been closed. So can we close this one, too?