It's all in the title really, what can someone achieve with my app key and app secret? The api needs to be authenticated against a user to access data. What are possible bad outcomes of a compromised app secret and key?
The app key and secret identify your app, and are used during the OAuth app authorization flow. They do not themselves offer access to any user data.
A leaked app key/secret pair would allow someone to: - impersonate your app (e.g., initiate the OAuth app authorization flow for your app). The potential here is limited though because they would not be able to register their own redirect URIs for your app. - send bogus but correctly signed webhook notifications (since Dropbox signs real webhooks notificaitons using the app secret).
A leaked app key/secret pair itself would not allow someone to access user data however, as that requires an actual access token.
We love to learn from the educators who use Dropbox. Whether you teach kids, teens, adults or a combination of all three, we want to know what apps and integrations you use with Dropbox to help with teaching. Which of the ones below is your favorite, or most used tool?