TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

AutoSpill attack steals credentials from Android password managers

4 pointsby matttahover 1 year ago

1 comment

rezonantover 1 year ago
As Ars mentions, Google maintains that these apps are not properly checking the context of the autofill. Android&#x27;s digital asset links is a secure way to verify that an app is associated with a specific web domain. As a password manager, you need to use these links to validate that the Android app you&#x27;re autofilling into matches the domain that you&#x27;re autofilling into.<p>If they don&#x27;t do that, they are effectively leaking your credentials through negligence. Recommend staying far away from the ones that dismissed this issue as wontfix.<p><a href="https:&#x2F;&#x2F;developer.android.com&#x2F;reference&#x2F;android&#x2F;service&#x2F;autofill&#x2F;AutofillService#web-security" rel="nofollow noreferrer">https:&#x2F;&#x2F;developer.android.com&#x2F;reference&#x2F;android&#x2F;service&#x2F;auto...</a>