Amazon is decompiling our apps in security gaffe hunt, says dev


High performance access to file storage

Amazon’s crackdown on mishandling AWS credentials has astonished one software developer, who says the cloud giant is reverse-engineering Android apps for inspection.

In this blog post, Raj Bala admitted his app included his private “AWS credentials as simple strings within the app itself”, and as a result, he’s received a notice from Amazon warning him against the practice.

Bala removed the app from the Google Play after receiving Amazon’s alert, which states among other things, that the app was “not developed according to AWS recommended security best practices”, since Bala appears to “have embedded your AWS Key ID (AKID) and its corresponding AWS Secret Key within the app”. This is a really bad idea because it means anyone can get hold of that information and hijack the developer’s account.

The rest of the note from Amazon provides instructions on its recommendations for using AWS credentials.

Bala, however, has a different bone to pick, complaining that the note is evidence that “Amazon or someone working with them is downloading apps from the Google Play Store and decompiling and/or otherwise inspecting them.”

It seems likely to The Register that Amazon is cracking down on where AWS credentials appear. As was reported at the Australian site ITNews last week, “thousands” of AWS secret keys have shown up in searches of Github, leaving some developers with unexpected bills once the world at large realized that there were credentials hidden in plain sight. ®

High performance access to file storage

Article source:


Comments are closed.