TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

AutoSpill attack steals credentials from Android password managers

4 点作者 matttah超过 1 年前

1 comment

rezonant超过 1 年前
As Ars mentions, Google maintains that these apps are not properly checking the context of the autofill. Android&#x27;s digital asset links is a secure way to verify that an app is associated with a specific web domain. As a password manager, you need to use these links to validate that the Android app you&#x27;re autofilling into matches the domain that you&#x27;re autofilling into.<p>If they don&#x27;t do that, they are effectively leaking your credentials through negligence. Recommend staying far away from the ones that dismissed this issue as wontfix.<p><a href="https:&#x2F;&#x2F;developer.android.com&#x2F;reference&#x2F;android&#x2F;service&#x2F;autofill&#x2F;AutofillService#web-security" rel="nofollow noreferrer">https:&#x2F;&#x2F;developer.android.com&#x2F;reference&#x2F;android&#x2F;service&#x2F;auto...</a>