Closed
Description
Android framework version
net8.0-android
Affected platform version
.Net 8.0.100, .Net 8.0.303 SDK
Description
We have a .NET 8 Android application using the default HttpClient without any custom HttpMessageHandler, trust manager, or certificate validation overrides.
However, in every run of AppSweep by Guardsquare, the following security issues are flagged:
net.dot.android.crypto.DotnetProxyTrustManager missing checkValidity() / verify()
Xamarin.android.net.ServerCertificateCustomValidator_TrustManager does not correctly validate TLS certificate chain
Asymmetric cipher used with insecure padding (likely RSA/PKCS#1 v1.5)
These issues appear even though:
We are targeting .NET 8 (e.g., net8.0-android in our project file)
We use default HttpClient with no override logic
Our app does not implement any custom crypto or certificate logic
After reviewing GitHub issues like #95506, #84202, and MSAL Android #2235, we believe these might be either:
False positives in AppSweep due to static analysis misinterpreting default behavior
Or residual references from internal Xamarin/MAUI code paths still present in the Android build
We would like to confirm:
Are these known false positives?
Can Microsoft provide guidance or updates to resolve these reports?
Is there a way to suppress or eliminate these at the source (framework level), rather than manually in every AppSweep scan?
We appreciate your help in clarifying this and ensuring these legitimate .NET 8 apps aren’t incorrectly flagged for security violations.
Steps to Reproduce
have a AppSweep run on the bundle with minimum sdk support of 29 and targetSdkVersion is 34
Did you find any workaround?
No response