导航菜单

应用安全检测报告

应用安全检测报告,支持文件搜索、内容检索和AI代码分析

移动应用安全检测报告

应用图标

SpeedCash v6.5.1482

Android APK 0e67a337...
47
安全评分

安全基线评分

47/100

中风险

综合风险等级

风险等级评定
  1. A
  2. B
  3. C
  4. F

应用存在一定安全风险,建议优化

漏洞与安全项分布

6 高危
33 中危
3 信息
3 安全

隐私风险评估

7
第三方跟踪器

高隐私风险
检测到大量第三方跟踪器


检测结果分布

高危安全漏洞 6
中危安全漏洞 33
安全提示信息 3
已通过安全项 3
重点安全关注 0

高危安全漏洞 不安全的Web视图实现。Web视图忽略SSL证书错误并接受任何SSL证书。此应用程序易受MITM攻击

不安全的Web视图实现。Web视图忽略SSL证书错误并接受任何SSL证书。此应用程序易受MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#webview-server-certificate-verification

Files:
com/bm/sc/bebasbayar/helper/WidgetHelper.java, line(s) 63,112,61,110
com/bm/sc/bebasbayar/ui/activity/FCMPopupActivity.java, line(s) 246,244
com/bm/sc/bebasbayar/ui/activity/PajakKolektifActivity.java, line(s) 56,54
com/bm/sc/bebasbayar/ui/activity/info/AuthWebViewActivity.java, line(s) 36,34
com/bm/sc/bebasbayar/ui/activity/info/HelpActivity.java, line(s) 213,211
com/bm/sc/bebasbayar/ui/activity/info/OpenPaymentWebViewActivity.java, line(s) 38,36
com/bm/sc/bebasbayar/ui/activity/info/OpenWebViewActivity.java, line(s) 38,36
com/bm/sc/bebasbayar/ui/activity/ubp/GameActivity.java, line(s) 458,456
com/bm/sc/bebasbayar/ui/activity/ubp/StreamingActivity.java, line(s) 449,447
com/bm/sc/bebasbayar/ui/fragment/cash/InvoiceHelpFragment.java, line(s) 59,57
com/bm/sc/bebasbayar/ui/fragment/home/IncomeBonusFragment.java, line(s) 95,93

高危安全漏洞 应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。

应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/bm/sc/bebasbayar/cardnfc/bni/tapcashgo/tapcashgo752a.java, line(s) 28,42
com/bm/sc/bebasbayar/ui/LockActivity.java, line(s) 385
com/bm/sc/bebasbayar/ui/activity/auth/FingerprintActivity.java, line(s) 149
com/bm/sc/bebasbayar/ui/fragment/home/ProfileFragment.java, line(s) 743
com/bm/sc/util/format/CastleCrypt.java, line(s) 33,40
com/bm/sc/util/format/Encrypt.java, line(s) 61

高危安全漏洞 如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击

如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-7

Files:
com/bm/sc/bebasbayar/adapter/list/promotion/EmailPromotionAdapter.java, line(s) 91,5
com/bm/sc/bebasbayar/ui/activity/FCMPopupActivity.java, line(s) 158,162,19,20
com/bm/sc/bebasbayar/ui/activity/info/HelpActivity.java, line(s) 394,401,19,20
com/bm/sc/bebasbayar/ui/fragment/cash/InvoiceHelpFragment.java, line(s) 53,14,15
com/bm/sc/bebasbayar/ui/fragment/dialog/ListBeritaFragment.java, line(s) 102,8

高危安全漏洞 使用弱加密算法

使用弱加密算法
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/bm/sc/bebasbayar/cardnfc/bri/ku.java, line(s) 92,154,174,204

高危安全漏洞 应用程序在加密算法中使用ECB模式。ECB模式是已知的弱模式,因为它对相同的明文块[UNK]产生相同的密文

应用程序在加密算法中使用ECB模式。ECB模式是已知的弱模式,因为它对相同的明文块[UNK]产生相同的密文
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-block-cipher-mode

Files:
com/bm/sc/util/format/Encrypt.java, line(s) 77,138

高危安全漏洞 应用程序包含隐私跟踪程序

此应用程序有多个7隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。

中危安全漏洞 应用数据允许备份

[android:allowBackup=true]
该标志允许通过 adb 工具备份应用数据。启用 USB 调试的用户可直接复制应用数据,存在数据泄露风险。

中危安全漏洞 Activity (com.bm.sc.bebasbayar.ui.activity.tcico.QRGeneratorViewActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.bm.sc.bebasbayar.ui.activity.cash.SourceOfFundActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.bm.sc.bebasbayar.ui.activity.ubp.CekSaldoEmoneyActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.bm.sc.kotlin.ui.ShareActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.bm.sc.bebasbayar.service.BBReferrerReceiver) 受权限保护,但应检查权限保护级别。

Permission: TODO [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (com.bm.sc.bebasbayar.service.BBPhoneStateReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.bm.sc.bebasbayar.service.BBSmsReceiver) 受权限保护,但应检查权限保护级别。

Permission: TODO [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (com.bm.sc.bebasbayar.service.BBFourDigitReceiver) 受权限保护,但应检查权限保护级别。

Permission: TODO [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (com.bm.sc.bebasbayar.service.BBUpdateNotificationReceiver) 受权限保护,但应检查权限保护级别。

Permission: TODO [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (com.google.android.gms.analytics.CampaignTrackingService) 未受保护。

[android:exported=true]
检测到  Service 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Service (com.bm.sc.bebasbayar.service.BBNotificationService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BIND_NOTIFICATION_LISTENER_SERVICE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (androidx.work.impl.background.systemjob.SystemJobService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Activity (com.facebook.CustomTabActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Service (com.google.android.gms.auth.api.signin.RevocationBoundService) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Activity (com.google.firebase.auth.internal.GenericIdpActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.google.firebase.auth.internal.RecaptchaActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Activity (com.google.android.gms.appinvite.PreviewActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.google.android.gms.tagmanager.TagManagerPreviewActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (androidx.profileinstaller.ProfileInstallReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 不安全的Web视图实现。可能存在WebView任意代码执行漏洞

不安全的Web视图实现。可能存在WebView任意代码执行漏洞
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#testing-javascript-execution-in-webviews-mstg-platform-5

Files:
com/bm/sc/auth/ui/home/HomeFragment.java, line(s) 809,839
com/bm/sc/auth/ui/home/HomeFragment1.java, line(s) 1173,1203
com/bm/sc/auth/ui/inbox/DetailPromoActivity.java, line(s) 115,145
com/bm/sc/bebasbayar/helper/WidgetHelper.java, line(s) 465,537,452,524
com/bm/sc/bebasbayar/ui/activity/PajakKolektifActivity.java, line(s) 339,331
com/bm/sc/bebasbayar/ui/activity/SurpriseActivity.java, line(s) 125,127
com/bm/sc/bebasbayar/ui/activity/account/DownlineLandingActivity.java, line(s) 147,149
com/bm/sc/bebasbayar/ui/activity/cash/DepositActivity.java, line(s) 575,577
com/bm/sc/bebasbayar/ui/activity/cash/DepositFormRegisterActivity.java, line(s) 160,163
com/bm/sc/bebasbayar/ui/activity/info/AuthWebViewActivity.java, line(s) 99,103
com/bm/sc/bebasbayar/ui/activity/info/HelpActivity.java, line(s) 475,472
com/bm/sc/bebasbayar/ui/activity/info/OpenWebViewActivity.java, line(s) 144,148
com/bm/sc/bebasbayar/ui/fragment/cash/InvoiceHelpFragment.java, line(s) 156,159
com/bm/sc/bebasbayar/ui/fragment/home/IncomeBonusFragment.java, line(s) 402,406
com/bm/sc/bebasbayar/ui/fragment/home/MissionFragment.java, line(s) 86,88

中危安全漏洞 应用程序创建临时文件。敏感信息永远不应该被写进临时文件

应用程序创建临时文件。敏感信息永远不应该被写进临时文件


Files:
com/bm/sc/auth/ui/base/common/CameraActivity.java, line(s) 107
com/bm/sc/bebasbayar/ui/activity/account/BerbagiActivity.java, line(s) 158
com/bm/sc/bebasbayar/ui/activity/account/DetailDocumentActivity.java, line(s) 258
com/bm/sc/bebasbayar/ui/activity/account/ProfilePictureActivity.java, line(s) 254
com/bm/sc/bebasbayar/ui/fragment/kyc/KycCameraCardFragment.java, line(s) 130
com/bm/sc/bebasbayar/ui/fragment/kyc/KycCameraFaceFragment.java, line(s) 130
com/bm/sc/util/android/Imagery.java, line(s) 442
com/journeyapps/barcodescanner/CaptureManager.java, line(s) 237
com/rajat/pdfviewer/util/FileUtils.java, line(s) 117
com/theartofdev/edmodo/cropper/CropImageActivity.java, line(s) 47
com/theartofdev/edmodo/cropper/b.java, line(s) 92

中危安全漏洞 IP地址泄露

IP地址泄露


Files:
com/theartofdev/edmodo/cropper/BuildConfig.java, line(s) 9
io/grpc/okhttp/h.java, line(s) 379,387,396,392

中危安全漏洞 可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息

可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-6

Files:
com/ekyc/bigvision/LiveActivity.java, line(s) 139,137

中危安全漏洞 应用程序使用不安全的随机数生成器

应用程序使用不安全的随机数生成器
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-random-number-generators

Files:
com/andrognito/patternlockview/utils/RandomUtils.java, line(s) 4
com/bm/sc/bebasbayar/cardnfc/bni/tapcashgo/card/tapcash/tapcashparseb.java, line(s) 14
com/bm/sc/bebasbayar/ui/activity/account/DownlineAddActivity.java, line(s) 32
com/bm/sc/bebasbayar/ui/activity/auth/RegisterActivity.java, line(s) 51
com/bm/sc/bebasbayar/ui/activity/tcico/QRGeneratorViewActivity.java, line(s) 43
com/bm/sc/util/format/Encrypt.java, line(s) 12
io/grpc/internal/DnsNameResolver.java, line(s) 31
io/grpc/internal/ExponentialBackoffPolicy.java, line(s) 5
io/grpc/internal/o.java, line(s) 26
io/grpc/okhttp/d.java, line(s) 71
io/grpc/util/OutlierDetectionLoadBalancer.java, line(s) 27
nl/dionsegijn/konfetti/core/emitter/PartyEmitter.java, line(s) 9

中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等

文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10

Files:
com/bm/sc/auth/helper/DataStoreHelper.java, line(s) 35
com/bm/sc/auth/other/StartConfig.java, line(s) 194
com/bm/sc/bebasbayar/BuildConfig.java, line(s) 15
com/bm/sc/bebasbayar/handler/MessageComposer.java, line(s) 10
com/bm/sc/bebasbayar/message/mp/DimoMessage.java, line(s) 109
com/bm/sc/bebasbayar/message/mp/LoginMessage.java, line(s) 28
com/bm/sc/bebasbayar/setting/ApiConfig.java, line(s) 32
com/bm/sc/bebasbayar/setting/session/AppSession.java, line(s) 24
com/bm/sc/bebasbayar/setting/session/ConfigSession.java, line(s) 85,82
com/bm/sc/bebasbayar/setting/session/DataSession.java, line(s) 29
com/bm/sc/bebasbayar/setting/session/DimoSession.java, line(s) 6
com/bm/sc/bebasbayar/ui/activity/account/DetailAccountActivity.java, line(s) 48,46,40,41,42,43,44,45
com/bm/sc/bebasbayar/ui/activity/account/DetailBankActivity.java, line(s) 30
com/bm/sc/bebasbayar/ui/fragment/home/ProfileFragment.java, line(s) 118,117,121,119,120
com/bm/sc/ecommerce/data/remote/form/TokenForm.java, line(s) 163
com/bm/sc/ecommerce/data/remote/response/DataResponse.java, line(s) 1960
com/bm/sc/ecommerce/data/remote/response/ProductDetailItem.java, line(s) 121
com/rabbitmq/client/ConnectionFactory.java, line(s) 51
com/rabbitmq/client/ConnectionFactoryConfigurator.java, line(s) 34,38
com/rabbitmq/client/Envelope.java, line(s) 33
com/rabbitmq/client/impl/recovery/RecordedExchangeBinding.java, line(s) 16
com/rabbitmq/client/impl/recovery/RecordedQueueBinding.java, line(s) 16
io/grpc/internal/TransportFrameUtil.java, line(s) 82

中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据

应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage

Files:
com/bm/sc/bebasbayar/service/BBDownloadManager.java, line(s) 129,136
com/bm/sc/bebasbayar/ui/activity/account/BerbagiActivity.java, line(s) 158
com/bm/sc/bebasbayar/ui/activity/account/ProfilePictureActivity.java, line(s) 197,372
com/bm/sc/bebasbayar/ui/activity/tcico/QRGeneratorViewActivity.java, line(s) 185,210
com/bm/sc/util/android/Imagery.java, line(s) 326,514,643,645,764,772,776,828,855
com/bm/sc/util/android/JavaScriptInterface.java, line(s) 35
com/github/mikephil/charting/charts/Chart.java, line(s) 570,617
com/github/mikephil/charting/utils/FileUtils.java, line(s) 121,149
com/rajat/pdfviewer/PdfViewerActivity.java, line(s) 814
com/rajat/pdfviewer/util/FileUtils.java, line(s) 92

中危安全漏洞 MD5是已知存在哈希冲突的弱哈希

MD5是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/andrognito/patternlockview/utils/PatternLockUtils.java, line(s) 141
com/bm/sc/util/format/Encrypt.java, line(s) 157

中危安全漏洞 SHA-1是已知存在哈希冲突的弱哈希

SHA-1是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/andrognito/patternlockview/utils/PatternLockUtils.java, line(s) 152
com/bm/sc/util/format/Encrypt.java, line(s) 148

中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库

应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2

Files:
com/bm/sc/bebasbayar/cardnfc/bni/tapcashgo/provider/tapcashgo784a.java, line(s) 5,6,24,34,36,37

中危安全漏洞 此应用可能包含硬编码机密信息

从应用程序中识别出以下机密确保这些不是机密或私人信息
凭证信息=> "com.google.android.geo.API_KEY" : "AIzaSyDTjfk1pzyrArFbvX_AlsJ8E-p74SNBLY0"
"com.google.firebase.crashlytics.mapping_file_id" : "09936a89a1bf427288367cb7579085fb"
"facebook_app_id" : "661682198317856"
"facebook_client_token" : "121eb359927c529698ca809640af6415"
"firebase_database_url" : "https://api-project-292053615616.firebaseio.com"
"google_api_key" : "AIzaSyCd20eBv32ADeePkTdScV-bG21XYAyIzBc"
"google_app_id" : "1:292053615616:android:b09974080e3c1421"
"google_crash_reporting_api_key" : "AIzaSyCd20eBv32ADeePkTdScV-bG21XYAyIzBc"
"library_appintro_authorWebsite" : "http://paolorotolo.github.io/"
"tiktok_app_id" : "7496554969823379473"
"transition_auth_icon" : "trans:auth:icon"
"transition_auth_title" : "trans:auth:title"
8a3c4b262d721acd49a4bf97d5213199c86fa2b9
2438bce1ddb7bd026d5ff89f598b3b5e5bb824b3
c56fb7d591ba6704df047fd98f535372fea00211
cc2751449a350f668590264ed76692694a80308a
76258302-46d7-451e-bcb5-3876f1194e2d
9b8f518b086098de3d77736f9458a3d2f6f95a37
8DC0DC40FE1DC582CF7099E2AACFBC10
3C37029CA595FE4E7E62FCB2F7909B2C
C152153D5807784C721A433B5B59636D
PSCIQGfoZidjEuWtJAdn1JGYzKDonk9YblI0uv96O8s=
df6b721c8b4d3b6eb44c861d4415007e5a35fc95
a4b7452e2ed8f5f191058ca7bbfd26b0d3214bfc

安全提示信息 此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它

此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard

Files:
com/bm/sc/bebasbayar/cardnfc/MyClipboardManager.java, line(s) 5,84
com/bm/sc/bebasbayar/helper/Affinity.java, line(s) 7,2335,2346,2357,2368
com/bm/sc/util/android/JSInterface.java, line(s) 5,23

安全提示信息 应用程序记录日志信息,不得记录敏感信息

应用程序记录日志信息,不得记录敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs

Files:
a/f.java, line(s) 9
com/bm/sc/bebasbayar/cardnfc/lib/bca/SClassLoader.java, line(s) 17,20
com/bm/sc/bebasbayar/ui/activity/cash/QRPay2Activity.java, line(s) 833
com/bm/sc/bebasbayar/ui/activity/cash/QRPayActivity.java, line(s) 888
com/bm/sc/util/format/Encrypt.java, line(s) 81
com/wdullaer/materialdatetimepicker/date/DayPickerView.java, line(s) 67,207,223
eu/davidea/fastscroller/FastScroller.java, line(s) 357
eu/davidea/flexibleadapter/SelectableAdapter.java, line(s) 74
eu/davidea/flexibleadapter/common/FlexibleItemAnimator.java, line(s) 713,721
eu/davidea/flexibleadapter/helpers/ActionModeHelper.java, line(s) 117,126
eu/davidea/flexibleadapter/helpers/StickyHeaderHelper.java, line(s) 99,133,266,338,216,219,62
eu/davidea/flexibleadapter/helpers/UndoHelper.java, line(s) 117,123,130,152,49,94,144
eu/davidea/flexibleadapter/utils/Log.java, line(s) 123,143
eu/davidea/flexibleadapter/utils/Logger.java, line(s) 12,18,24,30,36,42,48,54,60,43,61
eu/davidea/viewholders/FlexibleViewHolder.java, line(s) 68,81,100,114,117,150,163,160
io/grpc/internal/l.java, line(s) 1674
io/grpc/okhttp/internal/Platform.java, line(s) 447
org/greenrobot/eventbus/Logger.java, line(s) 35,40
org/simalliance/openmobileapi/service/SmartcardError.java, line(s) 82

安全提示信息 应用与Firebase数据库通信

该应用与位于 https://api-project-292053615616.firebaseio.com 的 Firebase 数据库进行通信

已通过安全项 此应用程序可能具有Root检测功能

此应用程序可能具有Root检测功能
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
com/bm/sc/auth/ui/ShareActivity.java, line(s) 627
com/bm/sc/auth/ui/SplashActivity.java, line(s) 372
com/bm/sc/util/android/Device.java, line(s) 139,123,127,87,127,127,127,127,127,326

已通过安全项 此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击

此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#testing-custom-certificate-stores-and-certificate-pinning-mstg-network-4

Files:
com/bm/sc/bebasbayar/cardnfc/bni/tapcashgo/tapcashgo775i.java, line(s) 30,29,30,28,28
com/bm/sc/bebasbayar/service/BBDonwloadPdfService.java, line(s) 165,165
com/bm/sc/ecommerce/data/remote/RetrofitInstance.java, line(s) 54,87
de/timroes/axmlrpc/XMLRPCClient.java, line(s) 125,118
io/grpc/okhttp/OkHttpChannelBuilder.java, line(s) 356,423,424,329,355,437,352,354,354
io/grpc/okhttp/OkHttpServerBuilder.java, line(s) 238,239,252
io/grpc/util/AdvancedTlsX509TrustManager.java, line(s) 118,117,219,116,116,135

已通过安全项 Firebase远程配置已禁用

Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/292053615616/namespaces/firebase:fetch?key=AIzaSyCd20eBv32ADeePkTdScV-bG21XYAyIzBc ) 已禁用。响应内容如下所示:

响应码是 403

综合安全基线评分总结

应用图标

SpeedCash v6.5.1482

Android APK
47
综合安全评分
中风险