导航菜单

应用安全检测报告

应用安全检测报告,支持文件搜索、内容检索和AI代码分析

移动应用安全检测报告

应用图标

Starpresta v4.0.3

Android APK 151f09c9...
54
安全评分

安全基线评分

54/100

低风险

综合风险等级

风险等级评定
  1. A
  2. B
  3. C
  4. F

应用存在一定安全风险,建议优化

漏洞与安全项分布

2 高危
19 中危
1 信息
3 安全

隐私风险评估

4
第三方跟踪器

中等隐私风险
检测到少量第三方跟踪器


检测结果分布

高危安全漏洞 2
中危安全漏洞 19
安全提示信息 1
已通过安全项 3
重点安全关注 0

高危安全漏洞 该文件是World Readable。任何应用程序都可以读取文件

该文件是World Readable。任何应用程序都可以读取文件
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#testing-local-storage-for-sensitive-data-mstg-storage-1-and-mstg-storage-2

Files:
com/datavisorobfus/k0.java, line(s) 29

高危安全漏洞 如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击

如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-7

Files:
i00IIIIi/jl.java, line(s) 90,10,11

中危安全漏洞 应用已启用明文网络流量

[android:usesCleartextTraffic=true]
应用允许明文网络流量(如 HTTP、FTP 协议、DownloadManager、MediaPlayer 等)。API 级别 27 及以下默认启用,28 及以上默认禁用。明文流量缺乏机密性、完整性和真实性保护,攻击者可窃听或篡改传输数据。建议关闭明文流量,仅使用加密协议。

中危安全漏洞 Broadcast Receiver (io.flutter.plugins.firebase.messaging.FlutterFirebaseMessagingReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (com.google.android.gms.auth.api.signin.RevocationBoundService) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (androidx.work.impl.background.systemjob.SystemJobService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.profileinstaller.ProfileInstallReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 应用程序使用不安全的随机数生成器

应用程序使用不安全的随机数生成器
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-random-number-generators

Files:
IiiII0I/IiiIII.java, line(s) 7
com/appsflyer/internal/AFb1gSDK.java, line(s) 18
com/datavisor/vangogh/util/ExceptionUtil.java, line(s) 7
com/datavisorobfus/o.java, line(s) 11
com/dinero/hoy/plugin/camera/FlutterCameraActivity.java, line(s) 28
com/dinero/hoy/plugin/face/FaceActivity.java, line(s) 33
i000I00/IiiI0I0.java, line(s) 28
i000IIiI/i00I0I.java, line(s) 21
i000IIiI/ii000i.java, line(s) 18
i000i000/IiiI.java, line(s) 3
i000i000/IiiI0I0.java, line(s) 12
i000i000/IiiI0II.java, line(s) 4
i000i000/IiiI0i.java, line(s) 39
i000i000/IiiII0.java, line(s) 3
i000i000/IiiII0I.java, line(s) 10
i000i000/IiiIII0.java, line(s) 4
i000i000/IiiIIII.java, line(s) 9
i000i000/i000iIiI.java, line(s) 8
i000i000/i0IiIi0.java, line(s) 13
i000i00I/IiiI0I0.java, line(s) 30
i000i00I/IiiII0.java, line(s) 22
i00I00iI/i00000I.java, line(s) 9
i00III/i000I0I0.java, line(s) 3
i00III/i000II0I.java, line(s) 7
i00IIIIi/b6.java, line(s) 46
i00IIIIi/ca.java, line(s) 7
i00IIIi0/i00I00i0.java, line(s) 4
i00i0000/i0I0I00.java, line(s) 8
i00i0000/i0II00I.java, line(s) 8
i00i0000/i0III0i.java, line(s) 8

中危安全漏洞 此应用程序可能会请求root(超级用户)权限

此应用程序可能会请求root(超级用户)权限
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
com/datavisorobfus/c.java, line(s) 91

中危安全漏洞 MD5是已知存在哈希冲突的弱哈希

MD5是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
IiiIiI0/IiiI0II.java, line(s) 57
i00IIIIi/b6.java, line(s) 377

中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库

应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2

Files:
i0000ii0/Iiii0.java, line(s) 4,5,6,7,73,83
i00I0ii/i0iI0Iii.java, line(s) 9,10,11,12,13,392
i00IIIIi/i000II00.java, line(s) 6,7,88,228,540,1099,1615
i00IIIIi/i00I000i.java, line(s) 4,5,15
i00IIIIi/l6.java, line(s) 3,49
i0I0iiI/i0000I0.java, line(s) 5,6,85,119,138,328,549,566,619,632
i0I0iiI/i000I0i.java, line(s) 4,5,135

中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据

应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage

Files:
com/datavisor/vangogh/storage/local/a.java, line(s) 104
com/datavisor/vangogh/storage/local/b.java, line(s) 12,13
com/datavisorobfus/i.java, line(s) 1432
com/datavisorobfus/l.java, line(s) 171
com/datavisorobfus/p.java, line(s) 279

中危安全漏洞 SHA-1是已知存在哈希冲突的弱哈希

SHA-1是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/datavisorobfus/e0.java, line(s) 24
com/datavisorobfus/l0.java, line(s) 11,30,47
i00I0iII/i0II000.java, line(s) 48

中危安全漏洞 IP地址泄露

IP地址泄露


Files:
com/datavisor/vangogh/util/ExceptionUtil.java, line(s) 63
com/datavisorobfus/g.java, line(s) 18
com/datavisorobfus/o.java, line(s) 98

中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等

文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10

Files:
com/appsflyer/appsflyersdk/AppsFlyerConstants.java, line(s) 7
com/datavisor/vangogh/face/DVKeyName.java, line(s) 4,5

中危安全漏洞 不安全的Web视图实现。可能存在WebView任意代码执行漏洞

不安全的Web视图实现。可能存在WebView任意代码执行漏洞
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#testing-javascript-execution-in-webviews-mstg-platform-5

Files:
com/datavisorobfus/h.java, line(s) 55,54
com/datavisorobfus/l.java, line(s) 237,236

中危安全漏洞 应用程序创建临时文件。敏感信息永远不应该被写进临时文件

应用程序创建临时文件。敏感信息永远不应该被写进临时文件


Files:
i0000I/IiiI0I0.java, line(s) 115
i0000IIi/i0iiIIi.java, line(s) 50

中危安全漏洞 应用程序包含隐私跟踪程序

此应用程序有多个4隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。

中危安全漏洞 此应用可能包含硬编码机密信息

从应用程序中识别出以下机密确保这些不是机密或私人信息
AdMob广告平台的=> "com.google.android.gms.ads.APPLICATION_ID" : "ca-app-pub-3940256099942544~3347511713"
"google_api_key" : "AIzaSyCW5TZ4cmVvPF3qbwJS0jEEB4aVuhWrer4"
"google_app_id" : "1:66920932801:android:b476369e4d37ea6c6efb40"
"google_crash_reporting_api_key" : "AIzaSyCW5TZ4cmVvPF3qbwJS0jEEB4aVuhWrer4"
MJCR3nbjtc8ARKt9HOAI/AZAzrHiEyhubQ==
E3F9E1E0CF99D0E56A055BA65E241B3399F7CEA524326B0CDD6EC1327ED0FDC1
KZGR3Uffq88OW6tuEewC9j5V3A==
FBA3AF4E7757D9016E953FB3EE4671CA2BD9AF725F9A53D52ED4A38EAAA08901
3BAF59A2E5331C30675FAB35FF5FFF0D116142D3D4664F1C3CB804068B40614F
H6ik7UfoqtAwYIZxE9A68jVW8J/oAjw=
dI2H2mzZqo8OQIQxI/oZ8itF3Lf7XC57dQ==
MJCR3nbjtc8ARKt/AP825zhTxLPuFzw=
B3EEABB8EE11C2BE770B684D95219ECB
FFE391E0EA186D0734ED601E4E70E3224B7309D48E2075BAC46D8C667EAE7212

安全提示信息 应用程序记录日志信息,不得记录敏感信息

应用程序记录日志信息,不得记录敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs

Files:
IiiI/IiiIII0.java, line(s) 211,213,229,119,276
IiiI/IiiIi.java, line(s) 236,238,112
IiiII0I/IiiII0I.java, line(s) 31,37,43,49,9
IiiII0I/i000iIiI.java, line(s) 140,513
IiiII0I/i0iiIIi.java, line(s) 20
IiiIiII/IiiIIII.java, line(s) 249,253
IiiIiII/i000iIiI.java, line(s) 154
IiiIiII/i00I0000.java, line(s) 117
IiiIiII/i00I0I00.java, line(s) 128
IiiIiII/i00III0I.java, line(s) 145
IiiIiII/i00IIII0.java, line(s) 82,86,90
IiiIiII/i00Ii00.java, line(s) 37,39
IiiIiII/i0iII.java, line(s) 120,122
IiiIiII/ii00iI.java, line(s) 41,43
IiiIii/ii000i.java, line(s) 176,239,274
Iiii000/IiiI0i.java, line(s) 352
Iiii000/IiiIII.java, line(s) 28,37,46,56,65,74,83,92,101,110,119
com/appsflyer/appsflyersdk/AppsflyerSdkPlugin.java, line(s) 421,430,483,540,560,565,801,100,115,378,475
com/appsflyer/internal/AFh1ySDK.java, line(s) 69,115,84,73,79,77
i00000/IiiI.java, line(s) 98
i000000/i0II00I.java, line(s) 321
i00000I/IiiI0II.java, line(s) 434
i00000iI/i0III0i.java, line(s) 39
i00000iI/i0iiIIi.java, line(s) 725,868,939,1053,1120,1140,1153,1180,1230,1280,1330,1346,1350,1413,1598,1648,1654,1663,1666,1707,1786,1831,2012,2064,2116,2220,2231,2238,2319,2415,2621,139,824,829,992,1028,1294,1298,1302,2003,2022,2030,2285,2293,2815
i0000I/IiiI00i.java, line(s) 187,223,267,269,72,79,81,87,209,211,217,220,249,36,64,75,83,90,111,119,130,190
i0000I/IiiI0I0.java, line(s) 58,69,71,116,132,192,194,204,216,220,222,227,243,265,292,109,188,196,212,253,269,284
i0000I/IiiII0.java, line(s) 116,107,111
i0000I00/IiiI0i.java, line(s) 215
i0000I00/IiiII0.java, line(s) 188
i0000I00/IiiII0I.java, line(s) 183,78,98,110,111,126,130
i0000IIi/i0000I00.java, line(s) 86
i0000IIi/i000Ii0.java, line(s) 266,269
i0000IIi/i000iIiI.java, line(s) 36
i0000IIi/i0iiIIi.java, line(s) 102,105,110
i0000i0I/IiiI0I0.java, line(s) 53,68,76,100,201,220,330,336,358,60
i0000ii0/i00I00I.java, line(s) 35
i0000ii0/i0I0I00.java, line(s) 54,66,94
i000I0/IiiII0.java, line(s) 53
i000I0/i0IiIi0.java, line(s) 170,173,176,179,232,235,238,241,262,265,268,271,274,277
i000I0i/IiiII0I.java, line(s) 78
i000I0ii/IiiI0I0.java, line(s) 20,30,39
i000I0ii/IiiIIII.java, line(s) 24,26,35,37,46,48,57,59,68,70
i000I0ii/i00Ii0.java, line(s) 67
i000I0ii/i00iI0i.java, line(s) 13
i000III/i000000.java, line(s) 69
i000III/i000I0I0.java, line(s) 44,53,67,87,102,116,130
i000III/i000I0Ii.java, line(s) 54,88
i000III/i000Ii0.java, line(s) 1120,1081,1119
i000III/i0I0iiI.java, line(s) 687,730,481,493,500,509,56,75,721
i000IIiI/i0000I00.java, line(s) 37,44,47,55,81,84,87,90,93
i000IIiI/i0000I0I.java, line(s) 15,22,29,14,21,28,35,36,49,50
i000IIiI/ii000i.java, line(s) 74
i000Ii0/IiiI.java, line(s) 20,26
i000Ii0/IiiI00i.java, line(s) 14
i000Iii0/IiiIII.java, line(s) 16
i000Iii0/i00000.java, line(s) 32
i000Iii0/i0I0I00.java, line(s) 90,94,99
i000Iii0/i0II00I.java, line(s) 57,260,292,296,364,367,391,397,405,195
i000i00I/IiiII0.java, line(s) 51,55,183
i00I0/i00I00I.java, line(s) 11,17,19,28
i00I000/IiiIi00.java, line(s) 352,314,318,235
i00I00iI/Iiii000.java, line(s) 23,37,46,56
i00I0I0I/i0Ii0ii.java, line(s) 44
i00I0II0/IiiIi.java, line(s) 14,36
i00I0II0/Iiii000.java, line(s) 43
i00I0i/IiiIi00.java, line(s) 91,228
i00I0i/i00000I0.java, line(s) 63
i00I0i/i00Iii.java, line(s) 27
i00I0i/i00iI0i.java, line(s) 710,709
i00I0iII/i000000I.java, line(s) 25
i00I0iII/i0000I0.java, line(s) 49
i00I0iII/i0000II0.java, line(s) 78,82,98,125,129,59
i00I0iII/i000I00I.java, line(s) 53,55,49
i00I0iII/i000IIi0.java, line(s) 309,408
i00I0iII/i00II.java, line(s) 57
i00I0iII/i00II00I.java, line(s) 269,377
i00I0iII/i0I0000I.java, line(s) 22,31
i00I0iII/i0I0I00.java, line(s) 41,69
i00I0iII/i0I0ii0i.java, line(s) 26
i00I0iII/i0II000.java, line(s) 52,106
i00I0iII/i0III0II.java, line(s) 124,130,150,157,40,48,57,62,72,81,82,84,96,105,113,122,135,148,163,172,186,226,53,87,102,116
i00I0iII/i0III0i.java, line(s) 126,177,184
i00I0iII/ii0I.java, line(s) 50
i00I0iII/ii0i0Ii.java, line(s) 71,41,90,102,112,118,121,123,127,145
i00I0ii/IiiIIII.java, line(s) 89,102,123,200,215,290,88,101,122,199,214,289,119,139,151,222,242,329
i00I0ii/i0000.java, line(s) 48,30,69
i00I0ii/i00000.java, line(s) 24
i00I0ii/i000000I.java, line(s) 39,80,150,38,79,93,149,185,227,256,285,94,186,228,257,286,46,202
i00I0ii/i00000I.java, line(s) 29,36,28,35
i00I0ii/i0000Iii.java, line(s) 63,62
i00I0ii/i000II.java, line(s) 11,19
i00I0ii/i00I.java, line(s) 35
i00I0ii/i00I000.java, line(s) 27
i00I0ii/i00I0000.java, line(s) 95,98,101,104,107,110,118,121,124,127,165,173
i00I0ii/i00II0II.java, line(s) 30
i00I0ii/i00IIIIi.java, line(s) 54
i00I0ii/i00Ii0.java, line(s) 17,14,14
i00I0ii/i0II00II.java, line(s) 31
i00I0ii/i0iI0Iii.java, line(s) 171,209,230,309,398,447,540,421
i00I0ii/ii0iI0.java, line(s) 68,116,161,171,224,291,307,338,351,357,377,382,72,165
i00II0i0/IiiIIII.java, line(s) 17
i00II0i0/i0II00I.java, line(s) 68,76,105,49,58,121
i00II0i0/i0Ii0ii.java, line(s) 18,15
i00III0/IiiIIII.java, line(s) 59,65,77,110,117
i00IIII/i00iIii.java, line(s) 21,30,37,29,36,43,44,50,51
i00IIIIi/cb.java, line(s) 14
i00IIIIi/dd.java, line(s) 75,79
i00IIIIi/gb.java, line(s) 71,89,133,168,83,125,128
i00IIIIi/i0000ii.java, line(s) 138,176
i00IIIIi/iii0i.java, line(s) 251
i00IIIIi/l4.java, line(s) 21
i00IIIIi/n8.java, line(s) 21,30,37,29,36,43,44,50,51
i00IIIIi/rc.java, line(s) 175
i00IIIIi/u6.java, line(s) 157
i00IIIIi/vi.java, line(s) 135
i00IIIIi/xc.java, line(s) 32
i00IIIi0/i0000I0I.java, line(s) 54
i00Ii00/IiiI00i.java, line(s) 63,67
i00Ii00i/IiiIII.java, line(s) 113,179,266,278,105,194
i00Ii00i/i0II00I.java, line(s) 7,11,19,23
i00Ii0I/i00000I0.java, line(s) 96
i00Ii0I/i000IIi.java, line(s) 54,219
i00Ii0I/i0I0I00.java, line(s) 41,73
i00Ii0I/i0Ii0ii.java, line(s) 503,508
i00Ii0I/ii0i0Ii.java, line(s) 70
i00Ii0Ii/IiiI0I0.java, line(s) 91,102
i00Ii0Ii/i0II00I.java, line(s) 50
i00i00i0/IiiIII.java, line(s) 28,35,38,47,85
i00i00i0/i00I0I.java, line(s) 103
i00iI000/IiiI00i.java, line(s) 45,50,37
i0II00I/IiiI.java, line(s) 57,88
i0Ii0ii/IiiIII.java, line(s) 30,34,38
i0Ii0ii/i0iiIIi.java, line(s) 31
i0IiIi0/IiiI.java, line(s) 95
i0IiIi0/IiiI00i.java, line(s) 68
i0IiIi0/IiiII0.java, line(s) 184,250,391
i0IiIi0/IiiII0I.java, line(s) 31,159,161
i0IiIi0/IiiIII0.java, line(s) 124,129
i0IiIi0/IiiIIII.java, line(s) 97,411
i0IiIi0/IiiIi.java, line(s) 137,144
i0IiIi0/IiiIi00.java, line(s) 98,238,245
i0IiIi0/Iiii000.java, line(s) 736
i0IiIiII/IiiI.java, line(s) 121,120
ii000i/IiiI0II.java, line(s) 60
ii000i/IiiI0i.java, line(s) 66
ii000i/IiiIII0.java, line(s) 138,147,260
ii0i0Ii/IiiI0I0.java, line(s) 51,54
org/microg/safeparcel/IiiI00i.java, line(s) 383

已通过安全项 此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击

此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#testing-custom-certificate-stores-and-certificate-pinning-mstg-network-4

Files:
i00IIII/iI00Ii0.java, line(s) 387,386,385,385

已通过安全项 此应用程序可能具有Root检测功能

此应用程序可能具有Root检测功能
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
IiiII0I/i000iIiI.java, line(s) 594,594,597,597
i00IIII/i00I0II0.java, line(s) 27
i00IIIIi/m7.java, line(s) 58

已通过安全项 Firebase远程配置已禁用

Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/66920932801/namespaces/firebase:fetch?key=AIzaSyCW5TZ4cmVvPF3qbwJS0jEEB4aVuhWrer4 ) 已禁用。响应内容如下所示:

{
    "state": "NO_TEMPLATE"
}

综合安全基线评分总结

应用图标

Starpresta v4.0.3

Android APK
54
综合安全评分
中风险