Closed
Bug 719238
Opened 14 years ago
Closed 11 years ago
Detect sensitive APIs used in apps
Categories
(addons.mozilla.org Graveyard :: Add-on Builder, defect, P2)
addons.mozilla.org Graveyard
Add-on Builder
Tracking
(Not tracked)
RESOLVED
WONTFIX
People
(Reporter: clouserw, Unassigned)
Details
(Whiteboard: [needs spec])
This bug is for detecting the use of sensitive/privileged APIs in app manifests. We can start with the geolocation API. This bug is a placeholder for now as:
1) We don't have the complete list of sensitive APIs
2) We don't have documentation for how to detect the sensitive APIs
mhanson and dchan are proposing something this week and the feedback for that should be done elsewhere but I wanted this bug filed. :)
| Reporter | ||
Updated•14 years ago
|
Assignee: mattbasta → fligtar
Priority: P1 → P3
| Reporter | ||
Comment 1•13 years ago
|
||
Should Justin be owning this bug? What is the status?
Updated•13 years ago
|
Assignee: fligtar → nobody
Comment 2•13 years ago
|
||
Is this bug still on the roadmap?
This bug doesn't seem to apply for v1 since only Mozilla will create certified apps and only certified apps get interesting permissions.
Comment 3•13 years ago
|
||
(In reply to David Chan [:dchan] from comment #2)
> This bug doesn't seem to apply for v1 since only Mozilla will create
> certified apps and only certified apps get interesting permissions.
That's not true, at least hopefully.
There are a number of "requires permission" APIs available to privileged 3rd party apps. There's an additional number of APIs only available to certified apps. In the interest of developers, the former should be the rule, unless we have a very very good reason to require certification for APIs (such as the dialer API).
Comment 4•13 years ago
|
||
From http://mxr.mozilla.org/mozilla-central/source/dom/apps/src/PermissionsInstaller.jsm
The list of ALLOW permissions for privileged apps is
["resource-lock", "alarms", "tcp-socket", "browser", "fmradio", "systemXHR"]
and PROMPT permissions is
["geolocation", "camera", "contacts", "device-storage:apps", "device-storage:pictures", "device-storage:videos", "device-storage:music", "device-storage:sdcard", "wifi"]
I thought the set was smaller, but you're right :wenzel. From the above list, the most concerning to me are the tcp-socket and systemXHR permission since it allows data ex-filtration.
The other permissions may or may not be dangerous in the absence of tcp-socket / systemXHR. The PROMPT permissions provide a way for an app to retrieve user data, but that may not be useful without a way to get the data off the device.
| Reporter | ||
Comment 5•11 years ago
|
||
The builder project has been discontinued as of April 1st, 2014.
The announcement last year: https://blog.mozilla.org/addons/2013/12/18/add-on-builder/
Next steps (still being written): https://developer.mozilla.org/en-US/Add-ons/SDK/Builder
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → WONTFIX
| Assignee | ||
Updated•11 years ago
|
Product: addons.mozilla.org → addons.mozilla.org Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•