Skip to content

Security Considerations: Writing first round of threats and mitigatio… #277

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 8 commits into
base: main
Choose a base branch
from

Conversation

simoneonofri
Copy link
Contributor

@simoneonofri simoneonofri commented Jun 16, 2025

(Web API level)

A first draft of the identified threats and potential mitigations (some already applied), particularly at the Web API level.

Threats

  • SOP Violation
  • Fingerprinting and Cross-Device Tracking
  • Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF)
  • Clickjacking & UI redressing
  • Reply Attack
  • Quishing
  • Phishing/Harvesting

Mitigations (already implemented or to be considered)

  • Data Minimization
  • Secure contexts
  • Limit API usage
  • Informing the user
  • Transient activation

Things to consider:

  • What else could go wrong (if there are other threats)
  • What can we do about the threats we have identified
  • Do we like the countermeasures we already have in place
  • Are there other mitigations to consider or write down
  • Overlaps/joint with Privacy

[cc'ing @Sh-Amir and @ZAnsaroudi]


Preview | Diff

…ns (Web API level)

A first draft of the identified threats and potential mitigations (some already applied), particularly at the Web API level.

*Threats*
- SOP Violation
- Fingerprinting and Cross-Device Tracking
- Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF)
- Clickjacking & UI redressing
- Reply Attack
- Quishing
-  Phishing/Harvesting

*Mitigations (already implemented or to be considered)*
-  Data Minimization
-  Secure contexts
-  Limit API usage
-  Informing the user
- Transient activation

Things to consider:
- What else could go wrong (if there are other threats)
- What can we do about the threats we have identified
- Do we like the countermeasures we already have in place
- Are there other mitigations to consider or write down

[cc'ing @Sh-Amir and @ZAnsaroudi]
@simoneonofri simoneonofri requested a review from a team as a code owner June 16, 2025 16:08
@simoneonofri simoneonofri requested review from RByers and removed request for a team June 16, 2025 16:08
@simoneonofri simoneonofri self-assigned this Jun 16, 2025
@simoneonofri simoneonofri added security-tracker Group bringing to attention of security, or tracked by the security Group but not needing response. security-considerations labels Jun 16, 2025
@marcoscaceres
Copy link
Collaborator

This still feel overly broad and not necessarily related to the API.


</ul>
<h4 id='quishing'>Quishing</h4>
<p>Quishing occurs when a malicious site tricks the user into replacing a legitimate QR code, tricking it into
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't understand "replacing" here. It seems like the attack is presenting the user with a maliciously-crafted QR code which when followed, will lead to a credential presentation request that will deliver the results to an unexpected party (either the attacker, or as a confused deputy confirming the user's identity for a request that the attacker made to some other verifier). Maybe the attacker is inserting it in a place where it looks to the user like a legitimate request from a different verifier, and that's a kind of replacement?

Copy link
Contributor Author

@simoneonofri simoneonofri Jun 23, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For the framing I was giving it, the QR code is managed directly by the API and displayed securely and not via an (controlled by an adversary).

Does that make sense to you, or do you think we should frame it differently?

simoneonofri and others added 6 commits June 23, 2025 15:44
Co-authored-by: Marcos Cáceres <marcosc@apple.com>
Co-authored-by: Nick Doty <npdoty@ischool.berkeley.edu>
removed Permission API, added Permission policy
update transient activation
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security-considerations security-tracker Group bringing to attention of security, or tracked by the security Group but not needing response.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants