CodeAnt AI home pagelight logodark logo
  • Dashboard
  • Dashboard
  • Documentation
  • Demo Call with CEO
  • Blog
  • Slack
  • Get Started
    • CodeAnt AI
    • Setup
    • Control Center
    • Pull Request Review
    • IDE
    • Compliance
    • Anti-Patterns
    • Code Governance
    • Infrastructure Security Database
    • Application Security Database
      • Apex
      • Bash
      • C
      • Clojure
      • Cpp
      • Csharp
      • Dockerfile
      • Elixir
      • Fingerprints
      • Generic
      • Go
      • Html
      • Java
      • Javascript
      • Json
      • Kotlin
      • Ocaml
      • Php
      • Problem-based-packs
      • Python
      • Ruby
      • Rust
      • Scala
      • Solidity
      • Swift
        • Biometrics-and-auth
        • Commoncrypto
        • Cryptoswift
        • Insecure-communication
        • Lang
        • Pathtraversal
        • Sql
        • Sqllite
        • Webview
        • Webview
          • Webview-allow-js
          • Webview-baseurl
          • Webview-evaluatejavascript-xss
          • Webview-fileaccess
            • Swift webview config allows file access
          • Webview-fraudulent
          • Webview-https
          • Webview-loadhtmlstring-xss
          • Webview-permission-readaccess
          • Webview-universal-fileaccess
      • Terraform
      • Typescript
      • Yaml
    Webview-fileaccess

    Swift webview config allows file access

    Webviews were observed that do not disable access to application files. If the WebView does not require loading content from the local filesystem of the application, this setting should be disabled.
    Likelihood: LOW
    Confidence: HIGH
    CWE:
    - CWE-272: Least Privilege Violation

    Swift evaluate jsSwift webview config fraudulent site warning
    twitterlinkedin
    Powered by Mintlify