导航菜单

应用安全检测报告

应用安全检测报告,支持文件搜索、内容检索和AI代码分析

移动应用安全检测报告

应用图标

CityMall v1.42.1

Android APK 239501dc...
46
安全评分

安全基线评分

46/100

中风险

综合风险等级

风险等级评定
  1. A
  2. B
  3. C
  4. F

应用存在一定安全风险,建议优化

漏洞与安全项分布

5 高危
28 中危
5 信息
2 安全

隐私风险评估

9
第三方跟踪器

高隐私风险
检测到大量第三方跟踪器


检测结果分布

高危安全漏洞 5
中危安全漏洞 28
安全提示信息 5
已通过安全项 2
重点安全关注 0

高危安全漏洞 应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。

应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
N0/a.java, line(s) 61

高危安全漏洞 已启用远程WebView调试

已启用远程WebView调试
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04c-Tampering-and-Reverse-Engineering.md#debugging-and-tracing

Files:
com/reactnativecommunity/webview/k.java, line(s) 555,16

高危安全漏洞 如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击

如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-7

Files:
com/clevertap/android/sdk/inapp/AbstractC0786f.java, line(s) 134,12,13
com/clevertap/android/sdk/inapp/AbstractC1082f.java, line(s) 134,12,13
com/clevertap/android/sdk/inapp/AbstractViewOnTouchListenerC0789i.java, line(s) 141,16,17
com/clevertap/android/sdk/inapp/AbstractViewOnTouchListenerC1085i.java, line(s) 141,16,17
com/reactnativecommunity/webview/k.java, line(s) 216,16
in/juspay/hypersdk/core/DynamicUI.java, line(s) 214,423,10
in/juspay/hypersdk/safe/JuspayWebView.java, line(s) 61,9,10

高危安全漏洞 该文件是World Writable。任何应用程序都可以写入文件

该文件是World Writable。任何应用程序都可以写入文件
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#testing-local-storage-for-sensitive-data-mstg-storage-1-and-mstg-storage-2

Files:
in/juspay/hypersdk/core/AndroidInterface.java, line(s) 684
in/juspay/hypersdk/data/KeyValueStore.java, line(s) 14

高危安全漏洞 应用程序包含隐私跟踪程序

此应用程序有多个9隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。

中危安全漏洞 应用已启用明文网络流量

[android:usesCleartextTraffic=true]
应用允许明文网络流量(如 HTTP、FTP 协议、DownloadManager、MediaPlayer 等)。API 级别 27 及以下默认启用,28 及以上默认禁用。明文流量缺乏机密性、完整性和真实性保护,攻击者可窃听或篡改传输数据。建议关闭明文流量,仅使用加密协议。

中危安全漏洞 应用数据允许备份

[android:allowBackup=true]
该标志允许通过 adb 工具备份应用数据。启用 USB 调试的用户可直接复制应用数据,存在数据泄露风险。

中危安全漏洞 Broadcast Receiver (live.citymall.customer.NotificationDismissBroadcastReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (live.citymall.customer.FullScreenPushNotificationActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (live.citymall.customer.OverlayFlow.ProductsModalActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (io.invertase.firebase.messaging.ReactNativeFirebaseMessagingReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (com.clevertap.android.sdk.pushnotification.fcm.CTFirebaseMessagingReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Activity (com.adster.sdk.mediation.adster.AdSterInterstitialActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (androidx.work.impl.background.systemjob.SystemJobService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Activity (in.juspay.hypersdk.core.CustomtabResult) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.facebook.CustomTabActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Service (com.google.android.gms.auth.api.signin.RevocationBoundService) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.profileinstaller.ProfileInstallReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 IP地址泄露

IP地址泄露


Files:
R3/AbstractC1218a.java, line(s) 81,81
R3/AbstractC6843a.java, line(s) 156,156
com/adster/sdk/mediation/customevent/AdSterMediationCustomEvent.java, line(s) 66
com/clevertap/android/sdk/CleverTapAPI.java, line(s) 788
e6/C0214a.java, line(s) 8,9,10,11,12
e6/C6315a.java, line(s) 9,11,13,15,17

中危安全漏洞 MD5是已知存在哈希冲突的弱哈希

MD5是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
M4/AbstractC0080k0.java, line(s) 39
M4/AbstractC0559k0.java, line(s) 40
N0/a.java, line(s) 60
com/RNFetchBlob/h.java, line(s) 58
in/juspay/hypersdk/security/EncryptionHelper.java, line(s) 153,231

中危安全漏洞 应用程序使用不安全的随机数生成器

应用程序使用不安全的随机数生成器
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-random-number-generators

Files:
F5/o.java, line(s) 9
Y6/a.java, line(s) 3
Y6/b.java, line(s) 3
c7/d.java, line(s) 10
c7/g.java, line(s) 7
com/clevertap/android/sdk/pushnotification/c.java, line(s) 11
com/simpl/android/fingerprint/a/a.java, line(s) 3
i0/C1089a.java, line(s) 24
i0/C6431a.java, line(s) 25
i0/g.java, line(s) 15
p7/s.java, line(s) 11
z6/a.java, line(s) 3

中危安全漏洞 不安全的Web视图实现。可能存在WebView任意代码执行漏洞

不安全的Web视图实现。可能存在WebView任意代码执行漏洞
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#testing-javascript-execution-in-webviews-mstg-platform-5

Files:
com/clevertap/android/sdk/inapp/AbstractC0786f.java, line(s) 74,69
com/clevertap/android/sdk/inapp/AbstractC1082f.java, line(s) 74,69
com/clevertap/android/sdk/inapp/AbstractViewOnTouchListenerC0789i.java, line(s) 120,115
com/clevertap/android/sdk/inapp/AbstractViewOnTouchListenerC1085i.java, line(s) 120,115
in/juspay/hypersdk/core/DynamicUI.java, line(s) 145,168,244,143
in/juspay/hypersdk/safe/Godel.java, line(s) 375,636,630

中危安全漏洞 可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息

可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-6

Files:
in/juspay/hypersdk/safe/Godel.java, line(s) 643,630

中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等

文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10

Files:
C2/a.java, line(s) 84
Q1/g.java, line(s) 84
com/adster/sdk/mediation/Settings.java, line(s) 81
com/adster/sdk/mediation/analytics/AnalyticsConstants.java, line(s) 67
com/heanoria/library/reactnative/locationenabler/AndroidLocationEnablerModule.java, line(s) 51,54
com/sudoplz/rninappupdates/SpReactNativeInAppUpdatesModule.java, line(s) 35,36
live/citymall/customer/BuildConfig.java, line(s) 15,17,14,22

中危安全漏洞 应用程序创建临时文件。敏感信息永远不应该被写进临时文件

应用程序创建临时文件。敏感信息永远不应该被写进临时文件


Files:
com/reactnativecommunity/webview/m.java, line(s) 292
com/rnmaps/maps/MapModule.java, line(s) 80
com/rnmaps/maps/a.java, line(s) 22
io/sentry/react/m.java, line(s) 735

中危安全漏洞 SHA-1是已知存在哈希冲突的弱哈希

SHA-1是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
S1/c.java, line(s) 13
io/sentry/util/t.java, line(s) 19

中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据

应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage

Files:
H0/AbstractC1082a.java, line(s) 40
H0/AbstractC6409a.java, line(s) 84
P1/a.java, line(s) 52
P3/D3.java, line(s) 19
com/RNFetchBlob/d.java, line(s) 514,540,459,509,521,522,532,533,534,535,536,537,538,539
com/learnium/RNDeviceInfo/RNDeviceModule.java, line(s) 401
com/reactnativecommunity/webview/m.java, line(s) 292
io/invertase/firebase/utils/ReactNativeFirebaseUtilsModule.java, line(s) 113,122,123,124
io/sentry/android/core/Y.java, line(s) 263,245

中危安全漏洞 此应用程序可能会请求root(超级用户)权限

此应用程序可能会请求root(超级用户)权限
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
io/sentry/android/core/internal/util/m.java, line(s) 21,21,21,21,21

中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库

应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2

Files:
X/a.java, line(s) 4,5,6,7,58,88
com/reactnativecommunity/asyncstorage/k.java, line(s) 4,5,6,46

中危安全漏洞 Firebase远程配置已启用

Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/84670138342/namespaces/firebase:fetch?key=AIzaSyBwdbXDOPT3Ocu2Cu-YiXpNQwJvvbJxs20 ) 已启用。请确保这些配置不包含敏感信息。响应内容如下所示:

{
    "entries": {
        "ab_cat_nav": "list",
        "ab_cat_screen_type": "A",
        "ab_cl_signup_test": "true",
        "ab_cl_welcome": "yes",
        "ab_combined_pdu_see_all": "AB",
        "ab_home_pdu": "b",
        "ab_onboarding_flow": "default",
        "ab_self_order": "yes",
        "ab_show_truecaller": "false",
        "ab_show_voice_assistant": "true",
        "ab_test_remote_config": "test",
        "autofill_and_submit": "true",
        "autofill_num_otp": "false",
        "cx_old_ref": "false",
        "new_carousel_obd": "true",
        "new_signup_design": "false"
    },
    "state": "UPDATE",
    "templateVersion": "60"
}

中危安全漏洞 此应用可能包含硬编码机密信息

从应用程序中识别出以下机密确保这些不是机密或私人信息
凭证信息=> "com.google.android.geo.API_KEY" : "AIzaSyBwdbXDOPT3Ocu2Cu-YiXpNQwJvvbJxs20"
AdMob广告平台的=> "com.google.android.gms.ads.APPLICATION_ID" : "ca-app-pub-3565148233967310~1197821272"
"CLEVERTAP_TOKEN" : "313-024"
"CODE_PUSH_DEPLOYMENT_KEY" : "Lvo3UjrK3atCul6lScsZ-D6IBDTA415NuVJpbg"
"CODE_PUSH_IOS_DEPLOYMENT_KEY" : "CZ0j_BAD3vHOOdTT262zmK34SlMGEa1DJvaNO"
"CodePushDeploymentKey" : "Lvo3UjrK3atCul6lScsZ-D6IBDTA415NuVJpbg"
"FINGERPRINT_API_KEY" : "GK70Q8NPPu0Y8626EMpp"
"SEGMENT_WRITE_KEY" : "RVWSJPgYiFyskgd6kyGSKRbImaGkDQyh"
"facebook_app_id" : "237892067883924"
"facebook_client_token" : "3bd51846376b1a8f39fc461839dcf613"
"firebase_database_url" : "https://citymall-production.firebaseio.com"
"google_api_key" : "AIzaSyBwdbXDOPT3Ocu2Cu-YiXpNQwJvvbJxs20"
"google_app_id" : "1:84670138342:android:2432e6ac90e50633007827"
"google_crash_reporting_api_key" : "AIzaSyBwdbXDOPT3Ocu2Cu-YiXpNQwJvvbJxs20"
"google_maps_key" : "AIzaSyBwdbXDOPT3Ocu2Cu-YiXpNQwJvvbJxs20"
"partnerKey" : "kGpkiafa1dfe50dee4c1bbb3fe6f328d7f241"
af335d0fed519cc08b0036993d32039f
fb68fde12f8d24307fa351f463d75d12
115792089210356248762697446949407573529996955224135760342422259061068512044369
115792089210356248762697446949407573530086143415290314195533631308867097853948
41058363725152142129326129780047268409114441015993725554835256314039467401291
6864797660130609714981900799081393217269435300143305409394463459185543183397655394245057746333217197532963996371363321113864768612440380340372808892707005449
39402006196394479212279040100143613805079739270465446667948293404245721771496870329047266088258938001861606973112319
26247035095799689268623156744566981891852923491109213387815615900925518854738050089022388053975719786650872476732087
32670510020758816978083085130507043184471273380659243275938904335757337482424
39402006196394479212279040100143613805079739270465446667946905279627659399113263569398956308152294913554433653942643
224c3ffff78ae826bfc9dfe18922542e
115792089237316195423570985008687907853269984665640564039457584007908834671663
1093849038073734274511112390766805569936207598951683748994586394495953116150735016013708737573759623248592132296706313309438452531591012912142327488478985984
9b8f518b086098de3d77736f9458a3d2f6f95a37
AIzaSyBShZuY5vUGzpbJBUTPI6Bsbp2pUdoN7sc
6864797660130609714981900799081393217269435300143305409394463459185543183397656052122559640661454554977296311391480858037121987999716643812574028291115057148
655f28c6b3db8e0011b3c2e6
6864797660130609714981900799081393217269435300143305409394463459185543183397656052122559640661454554977296311391480858037121987999716643812574028291115057151
258EAFA5-E914-47DA-95CA-C5AB0DC85B11
a4b7452e2ed8f5f191058ca7bbfd26b0d3214bfc
0123456789ABCDEFGHJKMNPQRSTVWXYZ
39402006196394479212279040100143613805079739270465446667948293404245721771496870329047266088258938001861606973112316
18f745834c88b68ad85d5c7c2fa66684
8325710961489029985546751289520108179287853048861315594709205902480503199884419224438643760392947333078086511627871
115792089210356248762697446949407573530086143415290314195533631308867097853951
115792089237316195423570985008687907852837564279074904382605163141518161494337
B3EEABB8EE11C2BE770B684D95219ECB
92e24361a6a4ab3cf83269
df6b721c8b4d3b6eb44c861d4415007e5a35fc95
36134250956749795798585127919587881956611106672985015071877198253568414405109
27580193559959705877849011840389048093056905856361568521428707301988689241309860865136260764883745107765439761230575
06fb64cac8eb430969eab1280199347b
8a3c4b262d721acd49a4bf97d5213199c86fa2b9
2438bce1ddb7bd026d5ff89f598b3b5e5bb824b3
3757180025770020463545507224491183603594455134769762486694567779615544477440556316691234405012945539562144444537289428522585666729196580810124344277578376784
2661740802050217063228768716723360960729859168756973147706671368418802944996427808491545080627771902352094241225065558662157113545570916814161637315895999846
cc2751449a350f668590264ed76692694a80308a
4009cd7a8ef2b0695ec9c1714e5c9702
48439561293906451759052585252797914202762949526041747995844080717082404635286
55066263022277343669578718895168534326250603453777594175500187360389116729240
c56fb7d591ba6704df047fd98f535372fea00211

安全提示信息 应用程序记录日志信息,不得记录敏感信息

应用程序记录日志信息,不得记录敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs

Files:
A1/g.java, line(s) 202
A1/j.java, line(s) 184
A1/k.java, line(s) 143,147,281
C2/C0747d.java, line(s) 15
C2/C1031d.java, line(s) 15
C4/i.java, line(s) 39,68,75,78,91,94,97,100,103
E0/C1035a.java, line(s) 220,230,257,261,280,284
E0/C6300a.java, line(s) 221,231,258,262,281,285
E0/d.java, line(s) 40
F0/C1052h.java, line(s) 40,49
F0/C6361h.java, line(s) 43,52
F0/e.java, line(s) 22
F4/AbstractC6372a.java, line(s) 15,22,29,14,21,28,42,43,49,50
F4/a.java, line(s) 15,22,29,14,21,28,42,43,49,50
F5/f.java, line(s) 41
F5/n.java, line(s) 46,54,91
G4/k.java, line(s) 56,62,74,95,102
G5/c.java, line(s) 145,178
H5/AbstractC3999b.java, line(s) 54
H5/AbstractC6424b.java, line(s) 66
H6/g.java, line(s) 33
H6/m.java, line(s) 76,235
I2/f.java, line(s) 124
I2/l.java, line(s) 92
I6/j.java, line(s) 33
I6/n.java, line(s) 70,184
L/a.java, line(s) 31
M4/AbstractC0086n0.java, line(s) 45
M4/AbstractC0565n0.java, line(s) 45
M4/C0081l.java, line(s) 46,50,62,69
M4/C0085n.java, line(s) 45,49,58
M4/C0560l.java, line(s) 49,53,65,72
M4/C0564n.java, line(s) 49,53,62
M4/K.java, line(s) 37,55
M4/O0.java, line(s) 31,42,47,58,60
M4/P.java, line(s) 31
M4/Q0.java, line(s) 16,18
M4/T0.java, line(s) 88
M4/Y.java, line(s) 46,50,55,191
M4/g1.java, line(s) 297
N3/a.java, line(s) 29,32,48
N3/b.java, line(s) 42,49
O/a.java, line(s) 178,183,190,194,210,220
P0/C1182b.java, line(s) 540
P0/C6793b.java, line(s) 540
Q0/C1190a.java, line(s) 85,84
Q0/C6808a.java, line(s) 86,85
Q0/b.java, line(s) 39
R/C6825f.java, line(s) 455
R/n.java, line(s) 34
R1/h.java, line(s) 149,159,167,252,301,312,333,355
S1/C1228e.java, line(s) 52
S1/C1229f.java, line(s) 111,135
S1/C6858e.java, line(s) 52
S1/C6859f.java, line(s) 151,175
S4/C4046e.java, line(s) 34
S4/C6868e.java, line(s) 37
S4/v.java, line(s) 23,56,32
V3/d.java, line(s) 163
W4/a.java, line(s) 106,176,188,258,201,273
Y4/C4102a.java, line(s) 41,46,33
Y4/C7017a.java, line(s) 45,50,37
Y4/h.java, line(s) 49
Z/C1308a.java, line(s) 110
Z/C7024a.java, line(s) 110
Z4/b.java, line(s) 55,66
a0/AbstractC0571a.java, line(s) 75
a0/AbstractC0832a.java, line(s) 75
a0/b.java, line(s) 20
a4/f.java, line(s) 16
a4/p.java, line(s) 18,15
a4/q.java, line(s) 58,66,95,39,48,111
com/adster/sdk/mediation/customevent/AdSterMediationCustomEvent.java, line(s) 103,124,140
com/adster/sdk/mediation/liftoff/LiftoffNetworkKt.java, line(s) 40
com/adsterreactnative/BannerAdManager.java, line(s) 45
com/adsterreactnative/InterstitialAdModule.java, line(s) 143,154
com/adsterreactnative/RewardedAdModule.java, line(s) 162,173
com/adsterreactnative/p.java, line(s) 156,179,271
com/agontuk/RNFusedLocation/RNFusedLocationModule.java, line(s) 48
com/brentvatne/exoplayer/f.java, line(s) 798,837,847,921,1247,526
com/cardreader/card_reader_lib/CardTask.java, line(s) 93,121,123,165,167,169,174,178,182,185,199,293,296,203,220
com/clevertap/android/pushtemplates/a.java, line(s) 9,19,25
com/clevertap/android/pushtemplates/d.java, line(s) 357
com/clevertap/android/sdk/t.java, line(s) 16,22,28,34,111,118,121,128,48,54,60,134,140,66,72,78,84,91,98,105,147,150
com/clevertap/react/CleverTapModule.java, line(s) 1459,131,255,303,309,312,492,593,599,610,619,622,647,661,706,719,844,854,1329,1349,1359,1451,1506,1647,1657,1667,1677,1687,1697,1723,1730,1757,1949,249,576,784,794,804,814,824,865,875,1422,1764,1879,1981
com/clevertap/react/a.java, line(s) 169
com/dylanvann/fastimage/FastImageUrlUtils.java, line(s) 19
com/dylanvann/fastimage/c.java, line(s) 31
com/dylanvann/fastimage/e.java, line(s) 111
com/faizal/OtpVerify/OtpVerifyModule.java, line(s) 124,145,49,58,71,85,105,110
com/heanoria/library/reactnative/locationenabler/AndroidLocationEnablerModule.java, line(s) 166,117,120,138,194
com/horcrux/svg/C0186v.java, line(s) 49
com/horcrux/svg/C6255v.java, line(s) 54
com/ibits/react_native_in_app_review/AppReviewModule.java, line(s) 100,105,110,115,121,126,131,134,137,149,153
com/imagepicker/b.java, line(s) 24
com/imagepicker/g.java, line(s) 26
com/learnium/RNDeviceInfo/RNDeviceModule.java, line(s) 209,269,579,639,767,947,963
com/learnium/RNDeviceInfo/e.java, line(s) 24,30,36,41,85
com/lugg/ReactNativeConfig/ReactNativeConfigModule.java, line(s) 30,34
com/microsoft/codepush/react/k.java, line(s) 248,252
com/react/rnspinkit/b.java, line(s) 68
com/reactnativecommunity/asyncstorage/h.java, line(s) 127,133,139,141,147,149
com/reactnativecommunity/checkbox/ReactCheckBoxManager.java, line(s) 37
com/reactnativecommunity/webview/h.java, line(s) 147,133,149
com/reactnativecommunity/webview/k.java, line(s) 170,183
com/reactnativecommunity/webview/m.java, line(s) 369,374,416,421,254,258,268,492
com/reactnativemmkv/MmkvModule.java, line(s) 42,31,37,39
com/rnmaps/maps/MapModule.java, line(s) 309
com/rnmaps/maps/MapTileWorker.java, line(s) 44
com/rnmaps/maps/h.java, line(s) 153
com/rnmaps/maps/o.java, line(s) 98,102,106,110,142,169,171,188,192,194,201,204
com/rnmaps/maps/p.java, line(s) 211,222
com/simpl/android/fingerprint/SimplFingerprint.java, line(s) 22
com/simpl/android/fingerprint/a/d.java, line(s) 21,31,45
com/simpl/android/fingerprint/a/l.java, line(s) 167,222
com/simpl/android/fingerprint/commons/exception/SimplAirbrakeNotifier.java, line(s) 122,134,138
com/simpl/android/fingerprint/commons/utils/VersionUtil.java, line(s) 17
com/sparkfabrikreactnativeidfaaaid/ReactNativeIdfaAaidModule.java, line(s) 35
com/sudoplz/rninappupdates/SpReactNativeInAppUpdatesModule.java, line(s) 60,213
com/swmansion/gesturehandler/react/RNGestureHandlerModule.java, line(s) 749
com/swmansion/gesturehandler/react/i.java, line(s) 103,170
com/swmansion/gesturehandler/react/j.java, line(s) 74
com/swmansion/reanimated/NativeMethodsHelper.java, line(s) 89
com/swmansion/reanimated/ReanimatedModule.java, line(s) 132
com/swmansion/reanimated/ReanimatedUIManagerFactory.java, line(s) 20
com/swmansion/reanimated/keyboard/WindowsInsetsManager.java, line(s) 53,62,107,126
com/swmansion/reanimated/layoutReanimation/AnimationsManager.java, line(s) 401,415
com/swmansion/reanimated/layoutReanimation/ReanimatedNativeHierarchyManager.java, line(s) 40
com/swmansion/reanimated/layoutReanimation/ScreensHelper.java, line(s) 22
com/swmansion/reanimated/layoutReanimation/SharedTransitionManager.java, line(s) 456
com/swmansion/reanimated/layoutReanimation/TabNavigatorObserver.java, line(s) 37,105
com/swmansion/reanimated/nativeProxy/NativeProxyCommon.java, line(s) 155
com/swmansion/reanimated/sensor/ReanimatedSensorContainer.java, line(s) 32
com/swmansion/rnscreens/C0199i.java, line(s) 65
com/swmansion/rnscreens/C6268i.java, line(s) 72
com/swmansion/rnscreens/ScreenStackHeaderConfigViewManager.java, line(s) 46
com/swmansion/rnscreens/ScreensModule.java, line(s) 61,72,64
com/swmansion/rnscreens/SearchBarManager.java, line(s) 40
com/swmansion/rnscreens/utils/ScreenDummyLayoutHelper.java, line(s) 181,302
com/th3rdwave/safeareacontext/k.java, line(s) 116
d1/a.java, line(s) 89
i0/C1089a.java, line(s) 102
i0/C1092d.java, line(s) 158
i0/C6431a.java, line(s) 108
i0/C6434d.java, line(s) 159
in/juspay/hyper/core/JuspayLogger.java, line(s) 13,19,56,25,50
in/juspay/hypersdk/core/AndroidInterface.java, line(s) 452,729,789
io/invertase/firebase/app/ReactNativeFirebaseAppModule.java, line(s) 32
io/invertase/firebase/app/a.java, line(s) 14
io/invertase/firebase/crashlytics/ReactNativeFirebaseCrashlyticsInitProvider.java, line(s) 18,21,24,26,37,40,43,45,56,59,62,64,76,73
io/invertase/firebase/crashlytics/ReactNativeFirebaseCrashlyticsModule.java, line(s) 88,80,91,135,144
io/invertase/firebase/messaging/ReactNativeFirebaseMessagingModule.java, line(s) 214
io/invertase/firebase/messaging/ReactNativeFirebaseMessagingReceiver.java, line(s) 16,21,41
io/invertase/firebase/utils/ReactNativeFirebaseUtilsModule.java, line(s) 99
io/sentry/android/core/C0355t.java, line(s) 77,75,67,71,79
io/sentry/android/core/C6551t.java, line(s) 79,77,69,73,81
io/sentry/android/replay/r.java, line(s) 48,106
io/sentry/android/replay/u.java, line(s) 29,54
io/sentry/g2.java, line(s) 18,27,33
live/citymall/customer/OverlayFlow/ProductsModalActivity.java, line(s) 83,103,208
m0/AbstractC1152a.java, line(s) 7,13,8,14
m0/AbstractC6733a.java, line(s) 7,13,8,14
m6/C0485c.java, line(s) 49,173
m6/C6751c.java, line(s) 59,185
n5/p.java, line(s) 30,21,37,44,29,36,43,50,51,57,58
org/greenrobot/eventbus/Logger.java, line(s) 68
q5/g.java, line(s) 30,21,37,44,29,36,43,50,51,57,58
q7/c.java, line(s) 415
s0/l.java, line(s) 79,80
s2/c.java, line(s) 102
u/a.java, line(s) 103
v1/c.java, line(s) 65,79,135,148,245,275,288
v4/x.java, line(s) 45
w1/C.java, line(s) 45,59,118,122,246,258,306
w2/b.java, line(s) 105
y0/c.java, line(s) 128,26,256,289
z0/AbstractC1312d.java, line(s) 57,98,99,58
z0/AbstractC7028d.java, line(s) 57,98,99,58
z0/i.java, line(s) 58,99,100,59
z7/e.java, line(s) 46,46,61

安全提示信息 应用程序可以写入应用程序目录。敏感信息应加密

应用程序可以写入应用程序目录。敏感信息应加密


Files:
e1/b.java, line(s) 88,88

安全提示信息 此应用侦听剪贴板更改。一些恶意软件也会监听剪贴板更改

此应用侦听剪贴板更改。一些恶意软件也会监听剪贴板更改
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard

Files:
com/reactnativecommunity/clipboard/ClipboardModule.java, line(s) 31,34,4

安全提示信息 此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它

此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard

Files:
com/clevertap/android/sdk/inbox/g.java, line(s) 4,44
com/reactnativecommunity/clipboard/ClipboardModule.java, line(s) 4,263
in/juspay/hypersdk/core/JBridge.java, line(s) 7,436

安全提示信息 应用与Firebase数据库通信

该应用与位于 https://citymall-production.firebaseio.com 的 Firebase 数据库进行通信

已通过安全项 此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击

此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#testing-custom-certificate-stores-and-certificate-pinning-mstg-network-4

Files:
com/adster/sdk/mediation/adster/AdSterRestAdapterImpl.java, line(s) 43,43
com/adster/sdk/mediation/analytics/AnalyticsRestAdapterImpl.java, line(s) 112,112
com/adster/sdk/mediation/liftoff/LiftoffApiService.java, line(s) 45,45
d1/c.java, line(s) 117,115,117,114,108,108
in/juspay/hypersdk/security/HyperSSLSocketFactory.java, line(s) 66,65,67,64,64
live/citymall/customer/OverlayFlow/api/ApiClient.java, line(s) 16,16
y7/c.java, line(s) 82,80,79
y7/d.java, line(s) 121,110,119,129,118,118,120
y7/i.java, line(s) 82,80,79,79
y7/j.java, line(s) 236,223,234,233,233

已通过安全项 此应用程序可能具有Root检测功能

此应用程序可能具有Root检测功能
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
in/juspay/hypersdk/data/SessionInfo.java, line(s) 143,147
io/sentry/android/core/internal/util/m.java, line(s) 64,21,21,21,21,21,21
n5/AbstractC4027c.java, line(s) 24
n5/AbstractC6773c.java, line(s) 25
q5/t.java, line(s) 24

综合安全基线评分总结

应用图标

CityMall v1.42.1

Android APK
46
综合安全评分
中风险