I found a huge flaw in bc.i wallet which was fixed only a week ago which allowed an arbitrary javascript injection. i dont know who to share it with.
i dont know if it worth making too much noise about and again show bc.i incompetence
waxwing
wow. i guess you could tell them you found something, but don't know whether anything would come of it.
as you say, all the neg publicity recently doesn't help
dansmith_btc
the thing is that they've already fixed it a week ago. But they did it on the quiet.
waxwing
seems like the best you could get from it is a job :)
rather optimistic, admittedly
dansmith_btc
basically a one-line fix https://github.com/blockchain/My-Wallet/commit/... . They used to allow data to come from non-HTTPS sockets. If you look in the code, this data from the sockets was pasted into the html document without any sanitizing. One could paste any <script> </script> code , including the code which would steal your passwords and such
This applied not only to malicious Tor exit nodes but any rogue ISP or VPN operator.
waxwing
interesting that it has the same pattern as the other flaw that was found: trying to improve usability at the expense of security.