[
https://issues.apache.org/jira/browse/CB-1113?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Joe Bowser resolved CB-1113.
----------------------------
Resolution: Fixed
There's no such thing as a malicious plugin, because it's up to the dev to read
the plugin code before inserting it.
> Add Verification to Proposed PluginSpec
> ---------------------------------------
>
> Key: CB-1113
> URL: https://issues.apache.org/jira/browse/CB-1113
> Project: Apache Cordova
> Issue Type: Bug
> Components: Android, Bada, BlackBerry, iOS, webOS, WP7
> Reporter: Joe Bowser
> Assignee: Joe Bowser
> Priority: Critical
>
> Here's a major problem with plugins. Right now we have no way to specify to
> our users which plugins work and which plugins are harmful. We have CB-1062
> which could be a very powerful feature, but I'm not going to turn it on
> because we could change how plugins work with this feature so that data is
> stolen.
> We need to have some verification mechanism so that we can prevent a
> malicious plugin from being used by an unsuspecting user. I know that they
> could read the Java code, but given that our users don't read Obj-C or Java
> code, this could really hurt them badly.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira