Skip to content

Potential risks of using logo_uri in Trust Marks #174

@jcmelati

Description

@jcmelati

The logo_uri claim in Trust Marks allows logos to point to arbitrary URLs. That brings security questions:

Security Concerns:

  • References permanently links to potentially uncontrolled resources
  • Unverifiable data content is inserted into a signed statement
  • Creates potential remote code execution attack vectors
  • Cross-site scripting (XSS) risks
  • Possible inconsistency in resource delivery over time

Without a compelling operational necessity for a logo in a trust mark, these security concerns suggest the logo_uri feature should probably be eliminated, or have its existence properly justified in regards to the concerns above.

Possible Solutions:

  1. Remove logo_uri field. The core purpose of trust marks is verifiable attestation. Logos are decorative and should be handled separately by applications that need them. This makes the Trust Mark self-contained.
  2. Embed logo as a base64 image or SVG within the trust mark.
  3. If embedding the logo bloats the JWT size, we could add a logo_hash field next to the logo_uri to verify logo hash integrity against the signed statement.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    Status

    Done

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions