Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security issue with the SDK #12

Open
vaibhavpandeyvpz opened this issue Aug 17, 2023 · 3 comments
Open

Security issue with the SDK #12

vaibhavpandeyvpz opened this issue Aug 17, 2023 · 3 comments

Comments

@vaibhavpandeyvpz
Copy link

vaibhavpandeyvpz commented Aug 17, 2023

The SDK is configured to send information to Sentry on below lines:

This captures a lot of information about the app and/or server and sends it Cashfree's Sentry account without consent from the organization using the SDK. It may contain a lot of information about the visitor (IP, user agent) and server (installation path, other environment variables) which are meant to be kept secret and absolutely have no deal with Cashfree.

@suhas-cashfree
Copy link
Collaborator

It captures only the SDK related data whenever there is a crash in the sdk @vaibhavpandeyvpz

@vaibhavpandeyvpz
Copy link
Author

vaibhavpandeyvpz commented Aug 17, 2023

I just updated the DSN in your library and tested it with your "included" Sentry config options as below:

image

Below is the modified code with updated DSN:

image

Below is what was captured:

File system paths:

image

OS information & software patch versions:

image

Package information:

image

SDK consumer's customer's browser information:

image

This crash information "must" remain private to the organization using the SDK, not Cashfree. To be honest, this is first time so far I've seen a server-side SDK hideously capturing unnecessary system and usage information without consent.

Errors happening on the SDK consumer side should be dealt by them and reported to Cashfree when needed. These code snippets are almost equivalent to malicious inserts 99% of the users won't even notice while installing the package.

Please get rid of this.

@suhas-cashfree
Copy link
Collaborator

suhas-cashfree commented Aug 17, 2023

Okay Okay. Understood. We will give the users more flexibility to choose whether they want to send additional information or not. By default, sdk will only capture stack trace.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants