Thanks for the reply.
I’m currently working on threat modeling for my PSSO extension and trying to understand the different attack scenarios.
For example, what if an attacker creates a separate SSO extension to generate a valid attestation, and then somehow replaces or injects a malformed payload from their own device into the registration request of another device, potentially updating the keys?
In such cases, what protections does the attestation mechanism provide?
Also, is it sufficient to send the attestation payload directly in the request body, or should I add an extra layer of security—such as wrapping the payload in a JWT and signing it using Secure Enclave–backed keys generated during registration—to ensure the payload hasn’t been tampered with?
At the same time, I want to avoid overengineering the solution. I’m trying to determine whether these additional measures are necessary or just redundant.