CodeAnt AI home pagelight logodark logo
  • Dashboard
  • Dashboard
  • Documentation
  • Demo Call with CEO
  • Blog
  • Slack
  • Get Started
    • CodeAnt AI
    • Setup
    • Control Center
    • Pull Request Review
    • IDE
    • Compliance
    • Anti-Patterns
    • Code Governance
    • Infrastructure Security Database
    • Application Security Database
      • Apex
      • Bash
      • C
      • Clojure
      • Cpp
      • Csharp
      • Dockerfile
      • Elixir
      • Fingerprints
      • Generic
      • Go
      • Html
      • Java
      • Javascript
      • Json
      • Kotlin
      • Ocaml
      • Php
      • Problem-based-packs
      • Python
      • Ruby
      • Rust
      • Scala
      • Solidity
      • Swift
        • Biometrics-and-auth
        • Commoncrypto
        • Cryptoswift
        • Insecure-communication
        • Lang
        • Pathtraversal
        • Sql
        • Sqllite
        • Webview
        • Webview
          • Webview-allow-js
          • Webview-baseurl
          • Webview-evaluatejavascript-xss
          • Webview-fileaccess
          • Webview-fraudulent
            • Swift webview config fraudulent site warning
          • Webview-https
          • Webview-loadhtmlstring-xss
          • Webview-permission-readaccess
          • Webview-universal-fileaccess
      • Terraform
      • Typescript
      • Yaml
    Webview-fraudulent

    Swift webview config fraudulent site warning

    Webviews were observed that explicitly opt ouf of the WKWebView fraudulent site warnings. Consider enabling such functionality, to better protect your users from fraud/malware.
    Likelihood: LOW
    Confidence: HIGH
    CWE:
    - CWE-272: Least Privilege Violation

    Swift webview config allows file accessSwift webview config https upgrade
    twitterlinkedin
    Powered by Mintlify