-
Notifications
You must be signed in to change notification settings - Fork 14
Closed
Description
The logo_uri claim in Trust Marks allows logos to point to arbitrary URLs. That brings security questions:
Security Concerns:
- References permanently links to potentially uncontrolled resources
- Unverifiable data content is inserted into a signed statement
- Creates potential remote code execution attack vectors
- Cross-site scripting (XSS) risks
- Possible inconsistency in resource delivery over time
Without a compelling operational necessity for a logo in a trust mark, these security concerns suggest the logo_uri feature should probably be eliminated, or have its existence properly justified in regards to the concerns above.
Possible Solutions:
- Remove
logo_urifield. The core purpose of trust marks is verifiable attestation. Logos are decorative and should be handled separately by applications that need them. This makes the Trust Mark self-contained. - Embed logo as a base64 image or SVG within the trust mark.
- If embedding the logo bloats the JWT size, we could add a
logo_hashfield next to thelogo_urito verify logo hash integrity against the signed statement.
Metadata
Metadata
Assignees
Labels
No labels
Type
Projects
Status
Done