Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

“Basic Electron Framework Exploitation” #653

Open
StephenLittBelch opened this issue Aug 7, 2019 · 1 comment

Comments

@StephenLittBelch
Copy link

commented Aug 7, 2019

As a novice to Electron, i'm not able to tell if the Standard Notes Desktop application would be impacted by this issue, particularly with a passcode put in place. Would anyone know?
Source: Basic Electron Framework Exploitation

On at least macOS Catalina it looks like this might be resolved at the OS-level:

Gatekeeper will ensure that all new apps you install — from the App Store or the internet — have been checked for known security issues by Apple before you run them the first time and periodically thereafter. This extends the protection from the app’s source to include automated checks for what’s in the app.
Source: macOSCatalina Preview: Security

@mobitar

This comment has been minimized.

Copy link
Member

commented Aug 8, 2019

Any Electron application would seem to be impacted. But it sounds like if an attacker can gain access to modify a program, they would also have access to install and run new programs.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
2 participants
You can’t perform that action at this time.