GeneXus Community Wiki
MENU
PAGE INFO
PAGE TOOLS
Add a category
Add a group
CREATE NEW PAGE
TBWelcome
Login
Register
Settings
Change Password
Logout
Search
Recents
i
Text Block
OWASP Top 10 2016 Mobile in GeneXus Applications (Android)
M1: 2016 - Improper Platform Usage
M2: 2016 - Insecure Data Storage
M3: 2016 - Insecure Communication
M4: 2016 - Insecure Authentication
M5: 2016 - Insufficient Cryptography
M6: 2016 - Insecure Authorization
M7: 2016 - Poor Code Quality
M8: 2016 - Code Tampering
M9: 2016 - Reverse Engineering
M10: 2016 - Extraneous Functionality
Page Id
40815
M1: 2016 - Improper Platform Usage
This documentation is valid for:
OWASP Documentation
Actions by GeneXus
GeneXus generated applications automatically ask for needed permissions to the end user on runtime. The applications do not ask for permissions over the device it doesn't need.
Sanitizes and control input data types and uses parametrized querys to avoid
SQL injections
.
GeneXus applications do not export sensitive functions and cannot be extracted from backups.
Since GeneXus v15 Upgrade 7 GeneXus allow for the developer to configure what can be done on
WebViews
(
session sharing
,
file execution
). Also,
disables JavaScript excecution on WebViews
.
Actions by Developers
If the developer uses External Objects or
User Controls
which need another permission to function he has to add manually the permission request needed to the application.
Page Id
40816
Next →
NextNode
Was this page helpful?
Your feedback about this content is important. Let us know what you think.
Sure!
No
Additional feedback?
comment
Thank you for your feedback!
Backlinks
See all
Forward links
See all
More from sgrampone
See all
Contributions by
EDIT
—
CREATED: 20 SEPTEMBER 2018 05:08 PM -
UPDATED: 2 OCTOBER 2018
02:35 PM
BY
SGRAMPONE