I'm largely familiar with risk around publishing a de-buggable app to the market, it basically breaks down to an attacker being able to perform remote code execution and leak the values of private and internal fields from the object instances and static fields.
*My questions is,* does anyone know to exploit a debuggable app to uncontrolled achieve code exec? Regards -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To unsubscribe from this group and stop receiving emails from it, send an email to android-security-discuss+unsubscr...@googlegroups.com. To post to this group, send email to android-security-discuss@googlegroups.com. Visit this group at http://groups.google.com/group/android-security-discuss. For more options, visit https://groups.google.com/groups/opt_out.