Description
While analyzing our Android application integrated with the Sentry Flutter SDK, we identified potential usage of android.os.Bundle.getSerializable() within internal calls originating from io.sentry.flutter.SentryFlutterPlugin. This appears to present an insecure deserialization risk, potentially allowing arbitrary code execution if untrusted input is processed.
We did not find any such use in our Dart codebase, and during APK decompilation, these flows appear to originate from the native SDK layer. Could you please confirm whether the Sentry Flutter/Android SDK enforces any validation, class whitelisting, or sandboxing when handling deserialized objects via getSerializable()? If not, is there a recommended mitigation or planned fix?