From 422ac4ebbd49c74981838c6555bee37039024339 Mon Sep 17 00:00:00 2001
From: Kevin Hufnagle
<grant-uri-permission element>.
When accessing a content provider, use parameterized query methods such as +
When accessing a content provider, use parameterized query methods such as {@link android.content.ContentProvider#query(Uri,String[],String,String[],String) query()}, {@link android.content.ContentProvider#update(Uri,ContentValues,String,String[]) update()}, and {@link android.content.ContentProvider#delete(Uri,String,String[]) delete()} to avoid @@ -207,13 +207,13 @@ href="{@docRoot}guide/topics/manifest/permission-element.html#plevel">signature protection level on permissions for IPC communication between applications provided by a single developer.
-Do not leak permission-protected data. This occurs when your app exposes data -over IPC that is only available because it has a specific permission, but does -not require that permission of any clients of it’s IPC interface. More -details on the potential impacts, and frequency of this type of problem is -provided in this research paper published at USENIX: http://www.cs.be -rkeley.edu/~afelt/felt_usenixsec2011.pdf
+Do not leak permission-protected data. This occurs when your app exposes +data over IPC that is available only because your app has permission to access +that data. The clients of your app's IPC interface may not have that same +data-access permission. More details on the frequency and potential effects +of this issue appear in this +research paper, published at USENIX. @@ -431,14 +431,14 @@ not execute JavaScript so cross-site-scripting is not possible.
Use {@link android.webkit.WebView#addJavascriptInterface addJavaScriptInterface()} with particular care because it allows JavaScript to invoke operations that are -normally reserved for Android applications. If you use it, expose +normally reserved for Android applications. If you use it, expose {@link android.webkit.WebView#addJavascriptInterface addJavaScriptInterface()} only to web pages from which all input is trustworthy. If untrusted input is allowed, untrusted JavaScript may be able to invoke Android methods within your app. In general, we recommend exposing {@link android.webkit.WebView#addJavascriptInterface addJavaScriptInterface()} only to JavaScript that is contained within your application APK.
-If your application accesses sensitive data with a +
If your application accesses sensitive data with a {@link android.webkit.WebView}, you may want to use the {@link android.webkit.WebView#clearCache clearCache()} method to delete any files stored locally. Server-side