Comment by surge
3 hours ago
I've threat modeled this myself, and as I understand it the Bitwarden client side decrypts/encrypts everything locally. So even if backend was entirely compromised, it's never getting anything without the master password, and that's never sent across by the client. Then again, there's also the web interface.
Yeah if an attacker was able to insert javascript then it's possible.
For this particular threat vector, where the client is compromised, the backend doesn’t matter.
A compromised server can inject exfil code into the web page it serves. If you only ever use the apps then you should be fine though.