Skip to content

Comments

Mobile aa7#2222

Open
Abhi1366-create wants to merge 1 commit intoOWASP:masterfrom
Abhi1366-create:mobile-aa7
Open

Mobile aa7#2222
Abhi1366-create wants to merge 1 commit intoOWASP:masterfrom
Abhi1366-create:mobile-aa7

Conversation

@Abhi1366-create
Copy link

This PR adds a playful scenario, STRIDE classification, and mitigation guidance for the MobileApp AA7 card.
Follows the tone and structure of AA2 and AA3.

@sydseter
Copy link
Collaborator

@Abhi1366-create that is a really funny scenario. I like it!

But....

What you are describing is web app authentication by pass, not mobile application bypass.

You should read the following pages:

https://mas.owasp.org/MASTG/tests/android/MASVS-CODE/MASTG-TEST-0034/
https://mas.owasp.org/MASTG/tests/ios/MASVS-CODE/MASTG-TEST-0079/

These describe how the instrumentation can allow a user access to a mobile device where sensitive information is stored on the device (not in the cloud). Which is the scenario we are looking at here. Besides that, your example is quite good.

@Abhi1366-create
Copy link
Author

Thanks for the clarification — that makes sense.

I've updated the scenario to focus on mobile object persistence and local tampering, aligned with the MASTG guidance you shared. Let me know if this better reflects the intended threat model.




What can go wrong?
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You forgot to format this into a h3 headline. See the text you removed.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Make sure you don’t remove the headlines. Add them back where appropriate please.

@Abhi1366-create Abhi1366-create force-pushed the mobile-aa7 branch 2 times, most recently from d50240c to e84af43 Compare February 15, 2026 09:02
@sydseter
Copy link
Collaborator

@Abhi1366-create one pf your commits are unverified. Please make sure they all have a verified signature.

@@ -1,11 +1,104 @@
## Scenario: Abdullah can bypass authentication by altering the usual process sequence or flow, or by undertaking the process in incorrect order, or by manipulating date and time values used by the app, or by using valid features for unintended purposes
\### Scenario
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There is a strange backward slash before all the headlines? Is there a purpose behind this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants