Harden Intent handling, WebView configuration, and FileProvider access in Android apps. Use when securing Intent extras, configuring WebViews, or exposing files via FileProvider. (triggers: **/*Activity.kt, **/*WebView*.kt, AndroidManifest.xml, Intent, WebView, FileProvider, javaScriptEnabled)
89
86%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
android:exported="false" for all internal Activities/Services unless needed for deep links.resolveActivity before starting implicit intents.See hardening examples for manifest and component restrictions.
javaScriptEnabled = false. Use WebViewClient and WebChromeClient to restrict navigation.allowFileAccess and allowFileAccessFromFileURLs to prevent local file theft via XSS.@JavascriptInterface (API 17+), strictly limit exposed API surface.See hardening examples for WebView lockdown patterns.
file:// URIs. Use FileProvider to generate content:// URIs with temporary permissions.EncryptedSharedPreferences for auth tokens and PII. Never use MODE_WORLD_READABLE.NetworkSecurityConfig to disable cleartextTrafficPermitted and implement certificate pinning.19a1140
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.