diff --git a/deepin-devicemanager-server/deepin-devicecontrol/org.deepin.devicecontrol.conf b/deepin-devicemanager-server/deepin-devicecontrol/org.deepin.devicecontrol.conf
index b7c47402..c01ecbbc 100644
--- a/deepin-devicemanager-server/deepin-devicecontrol/org.deepin.devicecontrol.conf
+++ b/deepin-devicemanager-server/deepin-devicecontrol/org.deepin.devicecontrol.conf
@@ -9,16 +9,16 @@
This configuration implements method-level permission separation:
- Default policy: DENY all access
- - Only whitelisted read-only methods are allowed for all users
- - Dangerous methods (aptUpdate, installDriver, disableInDevice, etc.)
- require authentication via Polkit
+ - Only whitelisted methods (used by frontend) are allowed, but require Polkit auth
+ - Methods not used by frontend are NOT whitelisted (security by minimal exposure)
IMPORTANT: When adding new DBus methods to this service:
- 1. For read-only/query methods: Add them to the whitelist below
- 2. For privileged/modify methods: Do NOT add to whitelist (require Polkit auth)
- 3. Test both security scenarios before merging
+ 1. Verify the method is actually used by the frontend code
+ 2. Add only actively used methods to the whitelist below
+ 3. All whitelisted methods require Polkit authentication
+ 4. Unused methods remain unwhitelisted to reduce attack surface
- Last updated: 2026-05-07 (VPLUS-2026-34718 security fix)
+ Last updated: 2026-05-09 (VPLUS-2026-34718 security fix - whitelist frontend methods only)
-->
@@ -30,7 +30,7 @@
-
+
+ send_member="isNetworkWakeup"/>
+
+ send_member="isDriverPackage"/>
+
+
+ send_member="enable"/>
+ send_member="enableKeyboard"/>
+ send_member="enablePrinter"/>
+
+ send_member="setWakeupMachine"/>
+ send_member="setNetworkWake"/>
+
+
+
+
+
+
+
+
+
+