Sicherheit: JWT-Token-Storage ungeschuetzt #72
Labels
No labels
block-planning
bug
documentation
duplicate
enhancement
feature
good first issue
help wanted
infrastructure
invalid
planning
priority:high
priority:low
question
refactoring
status:backlog
status:done
status:in-progress
status:todo
tech-decision
test
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: bollwerkadmin/bollwerk#72
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Bestandsaufnahme
JWT-Tokens (Access-Token + Refresh-Token) werden aktuell in der Room-Settings-Tabelle als Klartext Key-Value-Paare gespeichert (
SettingsEntity).Risiko
Betroffene Stellen
SettingsRepositoryImpl: Speichert/liest Tokens überSettingsDaoSyncServiceImpl: Nutzt Tokens aus dem Repository für HTTP-Requestsaccess_token,refresh_token,server_url,usernameMögliche Lösungsrichtungen (zur Erarbeitung im Ticket)