CrabNebula
  1. General
  2. 1. Cover
  3. 2. Intro
  4. 3. Adversary Types
  5. 4. Scope
  6. Management
  7. 5. Management Summary
    1. 5.1. Timeline
    2. 5.2. Auditors
    3. 5.3. Findings Overview
    4. 5.4. Future Topics
  8. Engineering
  9. 6. Engineering Summary
  10. 7. Vulnerability
    1. 7.1. Multiple Cross Site Scripting Vulnerabilities
    2. 7.2. Improper Sanitization of Tauri Command Arguments
  11. 8. Weakness
    1. 8.1. Improper Github Workflow Trigger Validation
    2. 8.2. Improper Allowlist Configuration
    3. 8.3. Dependencies Telemetry Data is not Disabled
    4. 8.4. Improper Tauri Security Configuration
    5. 8.5. Vulnerable NPM Dependencies
    6. 8.6. Vulnerable Cargo crates
  12. 9. Investigated
    1. 9.1. Proper Github Workflow Security
  13. Appendix
  14. 10. Overview
  15. 11. Tools
  16. 12. Adversary Types
    1. 12.1. Compromising
    2. 12.2. Input Control
    3. 12.3. Social Engineering

Bloop.ai Tauri Component Audit

Adversary Types

The following adversary types are explained more in detail in their respective sections.

  • Input Control Adversary
    • Cross Site Scripting
    • Remote source compromise
    • Logical Bug
  • Compromising Adversary
    • Developer Machines
    • Deployment Infrastructure
    • User Filesystem
    • User Applications
    • Network (Man-in-the-Middle)
  • Social Engineering Adversary