M8: Security Misconfiguration

Security misconfiguration encompasses insecure defaults, missing hardening, or ad-hoc changes that leave the mobile app or its infrastructure open to exploitation. Because mobile systems span device settings, backend APIs, cloud services, and CI/CD tooling, misconfigurations can creep in at multiple layers.

Typical Weakness Patterns

  • Leaving debug endpoints, verbose logging, or developer menus enabled in production builds.
  • Shipping with overly broad platform permissions, entitlements, or exported components (activities, services, broadcast receivers).
  • Misconfigured backend services (API gateways, authentication proxies, object storage buckets) that feed the mobile app.
  • Using outdated configurations for security headers, SSL/TLS, or content security policies in web views and APIs.

Detection Cues

  • Static review of Android manifest/iOS entitlement files for exported components or unnecessary permissions.
  • Configuration scanning of backend infrastructure (IaC reviews, CIS benchmarks) supporting the mobile experience.
  • Monitoring production logs for access to debug endpoints or other features that should be disabled.

Mitigation

  • Integrate hardening checklists into the release process—disable debug features, restrict platform permissions, and enforce production build flags.
  • Adopt configuration-as-code with peer review and automated policy enforcement to prevent drift.
  • Continuously monitor infrastructure for deviations, enabling alerts when storage buckets become public or when security groups are modified.
  • Document configuration baselines so teams know which settings must remain locked down for compliance and security.