Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[specs] Native allowlist support #153

Open
chadyj opened this issue Sep 9, 2022 · 1 comment
Open

[specs] Native allowlist support #153

chadyj opened this issue Sep 9, 2022 · 1 comment

Comments

@chadyj
Copy link
Contributor

chadyj commented Sep 9, 2022

Problem

The projectId is publicly available and anyone can copy the projectid of dapp/wallet and (ab)use it. Both WalletConnect and users want to ensure that third parties cannot use their projectId. This is possible with Allowlists.

For web-based apps we can use the http origin, but for native apps we need to find an alternative approach. Developers will be able to define allowlist rules in the WalletConnect Cloud app under project settings.

The relay server needs to securely and reliably identify the origin app, such as "Trust Wallet", and allow/deny based on that.

Native allowlist

Find or send an appropriate allowlist value in relay requests. When this value is added to the allowlist, any API requests which originate from other apps will be rejected.

Some discussed ideas have mentioned user-agents or bundleid's, but these are easily spoofed. Another approach is app attestation.

Notes

This is related to, and may be covered in the domain binding solution.

@tekenik
Copy link

tekenik commented Aug 2, 2023

Specs

@glitch-txs glitch-txs transferred this issue from WalletConnect/walletconnect-docs Oct 4, 2023
@glitch-txs glitch-txs reopened this Oct 4, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants