I'm largely familiar with risk around publishing a de-buggable app to the 
market,
it basically breaks down to an attacker being able to perform remote code 
execution
and leak the values of private and internal fields from the object 
instances and static fields.

*My questions is,* does anyone know to exploit a debuggable app to 
uncontrolled achieve code exec?

Regards

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to android-security-discuss+unsubscr...@googlegroups.com.
To post to this group, send email to android-security-discuss@googlegroups.com.
Visit this group at http://groups.google.com/group/android-security-discuss.
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to