Skip to content

MASWE-0116: Compiler Provided Security Features Not Used

Content in BETA

This content is in beta and still under active development, so it is subject to change any time (e.g. structure, IDs, content, URLs, etc.).

Send Feedback

Draft Weakness

This weakness hasn't been created yet and it's in draft. But you can check its status or start working on it yourself. If the issue has not yet been assigned, you can request to be assigned to it and submit a PR with the new content for that weakness by following our guidelines.

Check our GitHub Issues for MASWE-0116

Initial Description or Hints

e.g., PIC, stack canaries. Alternative title could be Memory Anti-Exploitation Mechanisms Not Implemented

Note: PIC cannot be switched off in newer versions of Android, the NDK does not link against such libraries anymore source.

Relevant Topics

  • PIC
  • stack canaries

References

MASTG v1 Coverage

No MASTG v1 tests are related to this weakness.

Tests

MASTG-TEST-0229: Stack Canaries not enabled MASTG-TEST-0230: Automatic Reference Counting (ARC) not enabled MASTG-TEST-0228: Position Independent Code (PIC) not Enabled MASTG-TEST-0223: Stack Canaries Not Enabled MASTG-TEST-0222: Position Independent Code (PIC) Not Enabled