Founder of ToDesktop
On October 2nd 2024, a security researcher (T/A xyz3va) reported that she was able to gain access to ToDesktop’s Firebase Service Admin Account.
We have reviewed logs and inspected app bundles. No malicious usage was detected. There were no malicious builds or releases of applications from the ToDesktop platform.
We promptly patched the vulnerability and rotated all keys. In addition to patching the vulnerability, we engaged a third-party cybersecurity company, Doyensec, to conduct an independent audit of our platform and build pipeline.
All timestamps are in Coordinated Universal Time (UTC).
Date and Time | What Happened |
---|---|
October 2nd, 6:36pm–6:58pm | The researcher reported the vulnerability, and we acknowledged and confirmed it. |
October 2nd, 9:00pm | Rotated all affected credentials. |
October 2nd, 10:00pm | Conducted a preliminary review of logs and investigated recent releases, with no immediate signs of unauthorized access. |
October 3rd, 8:13pm | Deployed a patch for the vulnerability to production. |
October 5th, 12:17pm | Completed a review of the logs. Confirming all identified activity was from the researcher (verified by IP Address and user agent). |
We resolved the vulnerability within 26 hours of its initial report, and additional security audits were completed by February 2025.
These are some of the actions that we have already taken:
No action is required. No malicious usage was detected. The vulnerability was patched within 26 hours of first being reported.
This leak occurred because the build container had broader permissions than necessary, allowing a postinstall
script in an application's package.json
to retrieve Firebase credentials. We have since changed our architecture so that this can not happen again, see the "Infrastructure and tooling" and "Access control and authentication" sections above for more information about our fixes.
Had this vulnerability not been identified and responsibly disclosed, a malicious actor could have potentially caused significant harm. In the worst case, this would have allowed an attacker to access the ToDesktop database, user accounts, and deploy unauthorized updates to applications.
I’m grateful that the security researcher came forward and disclosed the vulnerability responsibly.
Since no malicious activity occurred, we followed industry-standard advice indicating immediate disclosure was not required. However, in the spirit of transparency, we chose to disclose after completing internal and third-party audits.
We sincerely regret that our security measures fell short, potentially putting customer applications at risk. However, I am proud of ToDesktop's rapid response in addressing the vulnerability and our proactive steps to enhance the platform's security.
While the initial report and fix occurred in October 2024, we took additional time to complete a third-party audit with Doyensec, finalized on February 25th, 2025. After undertaking internal and third-party audits, we are confident in the security and resilience of the ToDesktop platform. This incident has reinforced our commitment to security, and we are dedicated to continuously improving our processes to protect our customers and their applications.
We thank the security researcher, T/A xyz3va, for identifying and responsibly disclosing this vulnerability. She has shared more technical details here.
No malicious usage was detected. If you have any concerns or questions, please contact us at [email protected].