

1.3 When storing data on the device, use a file encryption API provided by the OS or other trusted source.The relative security of client vs server-side security also needs to be assessed on a case-by-case basis (see ENISA cloud risk assessment (3) or the OWASP Cloud top 10 (4) for decision support). This is based on the assumption that secure network connectivity is sufficiently available and that protection mechanisms available to server side storage are superior. 1.2 Store sensitive data on the server instead of the client-end device.Validate the security of API calls applied to sensitive data. Process, store and use data according to its classification. passwords, personal data, location, error logs, etc.).


M5: Poor Authorization and Authentication.M3: Insufficient Transport Layer Protection.Please note: Previous Work is shown below, 2023 Top 10 Final is still Work In Progress Top 10 Mobile Risks - Final List 2016 Unprotected Endpoints (Deeplink, Activitity, Service …).Vulnerabilities which didn’t make the place on Beta 3 Draft list, but in future we may consider them. M6: Insufficient Input/Output Validation.M1: Insecure Authentication/Authorization.Join us on the slack channel for contributions!!īelow is the OWASP Mobile Top-10 2023 Beta 3 Draft Top 10 Mobile Risks Beta 3 Draft 2023 If you face any issue joining us on Slack, please feel free to reachout to Project Leads. We would love to see you participate and contribute to the research we are doing. The new Mobile Top 10 list for 2023 are being worked upon.
