Electron Security Concernsedit
If you are not vigilant when building Electron apps, you will probably be placing the users of your app in tangible digital danger. Things like XSS (Cross Site Scripting) and remote code execution can literally enable attackers to get deep access to the data in your app - and potentially even the underlying operating system.
Especially when working “in the open”, i.e. as an open-source project, you will definitely want to consider hardening your application with code-signing and integrity checking. (See “Tips” section)
Under no circumstances should you load and execute remote code with Node.js integration enabled. Instead, use only local files (packaged together with your application) to execute Node.js code. To display remote content, use the
<webview> tag and make sure to disable the nodeIntegration.
Checklist: Security Recommendations
The Electron team itself makes the following recommendations:
- Only load secure contentlaunch
- Disable the Node.js integration in all renderers that display remote contentlaunch
- Enable context isolation in all renderers that display remote contentlaunch
ses.setPermissionRequestHandler()in all sessions that load remote contentlaunch
- Define a
Content-Security-Policylaunch and use restrictive rules (i.e.
- Do not disable
- Do not set
- Do not enable experimental featureslaunch
- Do not use
<webview>: Do not use
<webview>: Verify options and paramslaunch
- Disable or limit navigationlaunch
- Disable or limit creation of new windowslaunch
Except for items 3, 4 & 5 above, Electron will put a warning in the dev console if one of the these issues have been detected.
Tips and Tricks
You should know this by now, but if you are not using https / sftp / wss then the app’s communications with the outside world can be very easily tampered with. Whatever you are building, please use a secure protocol everywhere.
Having read & write permissions to the filesystem is the holy grail for penetration testers, and if your app enables this type of interaction, consider using IPC and multiple windows (with varying permissions) in order to minimize the attack surface.
If the user of your application has secrets like wallet addresses, personal information or some other kind of trade secrets, keep that information encrypted when at rest, un-encrypt it in-memory only when it is needed and make sure to overwrite / destroy the object in memory when you are done with it. But no matter how you approach this, follow these four rules:
- use strong crypto (i.e. collision resistant and not md5)
- do not invent a novel type of encryption
- follow the implementation instructions explicitly
- think about the user-experience
Disable developer tools in production
You probably don’t want rogue hoody-wearing menaces to be executing something like this in the console of your app:
ALT-CMD-I on Mac) will open the dev tools and enable inspection of the application. It will even enable some degree of modification. Prevent the simple
evil maid attack by catching these keypresses and
When you have built your binary blobs and want to publish them e.g. on GitHub, use
shasum and post these results somewhere prominent (like on the GitHub release page for your project) and potentially on a public blockchain, such as Steemlaunch.
$ shasum -a 256 myApp-v1.0.0_darwin-x64.dmg 40ed03e0fb3c422e554c7e75d41ba71405a4a49d560b1bf92a00ea6f5cbd8daa myApp-v1.0.0_darwin-x64.dmg
Sign the builds
Although not a hard requirement for sharing your app, signing code is a best practice - and it is required by both the MacOS and Windows stores. Read more about it at this official Electron tutoriallaunch.
Snyk.iolaunch is a service, CLI and even GitHub integration bot that tracks vulnerabilities in node modules by comparing the dependencies in your package.json with its list of compromised modules. In many cases their service can recommend minimum update versions or even provide modules that they themselves have patched. They also undertake research and vulnerability disclosure. For an example of something that should scare the socks off of you if you are doing anything with compressed files (zip, tar, etc.) check out their writeuplaunch and list of affected softwarelaunch.
For the truly paranoid
Use a dedicated physical desktop machine for each platform target. If you have to keep this device online, make sure the OS is always updated, permits zero inbound connections from the internet / bluetooth (especially for shell / ssh) and run constant virus and rootkit checks.
Permit only GPG-signed commits to be merged and require at least two team members (who did not make the PR) to review and approve the commit.
Reconsider your node package management system:
- use a private npm registry (like JFroglaunch)
- fix your packages to specific versions known to work
- use pnpm
- audit each and every single module and its dependencies
Pay to get hacked
Somebody smart might have hacked your project (or an underlying library). If you are making money with this app, consider getting a Hacker Onelaunch account and running a constant bounty award. At least you’ll be able to convince the hacker to be ethical and NOT sell the exploit to your competitor.
You may feel overwhelmed, because the awesomeness of Electron brings with it a great many headaches that you never wanted to think about. If this is the case, consider reaching outlaunch and getting expert support for the review, audit and hardening of your app by the team of seasoned devs that brought you the Quasar Framework.
Parts of this page have been taken from the official Electron Security Guidelaunch.