Skip to content

Port MASTG-TEST-0035: Testing for Overlay Attacks (android) (by @appknox)#3593

Open
MaxBytes06 wants to merge 7 commits intoOWASP:masterfrom
MaxBytes06:overlay_attack_draft1
Open

Port MASTG-TEST-0035: Testing for Overlay Attacks (android) (by @appknox)#3593
MaxBytes06 wants to merge 7 commits intoOWASP:masterfrom
MaxBytes06:overlay_attack_draft1

Conversation

@MaxBytes06
Copy link

@MaxBytes06 MaxBytes06 commented Dec 15, 2025

Closes #2983

Description

TBD


AI Tool Disclosure

Check exactly one option.

  • This contribution does not include AI-generated content.
  • This contribution includes AI-generated content.

If AI tools were used to generate or substantially modify code or text, complete the following.

  • AI tools used: e.g. ChatGPT, GitHub Copilot, Claude.
  • Models and versions: e.g. GPT-, Claude .
  • Prompt summary: brief description of the key prompts or instructions.
  • Your mobile security expertise level: low, medium, high.

For first-time contributors using AI tools.

  • Provide an export of the AI chat or session, for example a shared link or PDF attachment.
  • Ensure the commit history shows an initial commit with AI-generated content followed by commits that demonstrate review, correction, and improvement.

Undisclosed use of AI tools will result in the PR being closed. Large rewrites or bulk changes generated by AI require explicit prior approval from the maintainers. Learn more in "Use of AI tools in contributions".


Contributor Checklist

  • I have read and understood the contributing guidelines.
  • I followed the project style guide.
  • I validated the technical correctness of my changes and understand the topic.
  • This PR adds clear value and is not spam or low-effort content.

Relevant documentation.

Contributors are expected to understand basic git and GitHub workflows, including forks, branches, commits, and pull requests. The project does not provide training. Pull requests that do not meet these minimum requirements may be closed without review.

@cpholguera cpholguera requested a review from Diolor January 6, 2026 12:51
* 1. Missing FLAG_SECURE on the window.
* 2. Missing touch filtering/protection on sensitive views (simulated check).
*/
class VulnerableLoginActivity : AppCompatActivity() {
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The class is now an activity so the demo app doesn't work.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what do u need me to do?

Copy link
Collaborator

@Diolor Diolor Jan 13, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Reality2byte the message is meant for the author of the PR. If you wish to contribute, please feel free to check the open issues :)

import android.widget.TextView
import android.view.Gravity

// IMPORTANT: Assume DemoResults, Status are defined elsewhere in your project
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

those seem to be LLM comments. Do they add value?


To mitigate these attacks please carefully read the general guidelines about Android View security in the [Android Developer Documentation](https://developer.android.com/reference/android/view/View#security "View Security"). For instance, the so-called _touch filtering_ is a common defense against tapjacking, which contributes to safeguarding users against these vulnerabilities, usually in combination with other techniques and considerations as we introduce in this section.

## Static Analysis
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this whole context is missing please migrate the test according to the guidelines. Using LLMs will not help you, and you will need manual writing and research in this.

@cpholguera
Copy link
Collaborator

@MaxBytes06 please review the PR description, add an actual description and fill in the information on the disclosures. Thank you.

@cpholguera cpholguera changed the title Port MASTG-TEST-0035: Testing for Overlay Attacks(android) (by @appknox) Port MASTG-TEST-0035: Testing for Overlay Attacks (android) (by @appknox) Jan 14, 2026
@cpholguera
Copy link
Collaborator

@MaxBytes06 this is a reminder to review the PR description, add an actual description and fill in the information on the disclosures.

Also, the app that you are proposing doesn't build, see the checks https://github.com/OWASP/mastg/actions/runs/21352598855/job/61452571526?pr=3593

Thank you.

Copy link
Collaborator

@serek8 serek8 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR misses come content from the old test. I think we should still cover:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

MASTG v1->v2 MASTG-TEST-0035: Testing for Overlay Attacks (android)

5 participants