应用安全检测报告
应用安全检测报告,支持文件搜索、内容检索和AI代码分析
移动应用安全检测报告

젠브로 v2.8
50
安全评分
安全基线评分
50/100
低风险
综合风险等级
风险等级评定
- A
- B
- C
- F
应用存在一定安全风险,建议优化
漏洞与安全项分布
4
高危
15
中危
3
信息
3
安全
隐私风险评估
1
第三方跟踪器
中等隐私风险
检测到少量第三方跟踪器
检测结果分布
高危安全漏洞
4
中危安全漏洞
15
安全提示信息
3
已通过安全项
3
重点安全关注
1
高危安全漏洞 App 链接 assetlinks.json 文件未找到
[android:name=kr.co.smartskin.zenbro2014.MainActivity][android:host=http://m.zenbro.co.kr] App Link 资产验证 URL(http://m.zenbro.co.kr/.well-known/assetlinks.json)未找到或配置不正确。(状态码:403)。应用程序链接允许用户通过 Web URL 或电子邮件直接跳转到移动应用。如果 assetlinks.json 文件缺失或主机/域配置错误,恶意应用可劫持此类 URL,导致网络钓鱼攻击,泄露 URI 中的敏感信息(如 PII、OAuth 令牌、魔术链接/重置令牌等)。请务必通过托管 assetlinks.json 文件并在 Activity 的 intent-filter 中设置 [android:autoVerify="true"] 来完成 App Link 域名验证。
高危安全漏洞 App 链接 assetlinks.json 文件未找到
[android:name=kr.co.smartskin.zenbro2014.MainActivity][android:host=https://m.zenbro.co.kr] App Link 资产验证 URL(https://m.zenbro.co.kr/.well-known/assetlinks.json)未找到或配置不正确。(状态码:403)。应用程序链接允许用户通过 Web URL 或电子邮件直接跳转到移动应用。如果 assetlinks.json 文件缺失或主机/域配置错误,恶意应用可劫持此类 URL,导致网络钓鱼攻击,泄露 URI 中的敏感信息(如 PII、OAuth 令牌、魔术链接/重置令牌等)。请务必通过托管 assetlinks.json 文件并在 Activity 的 intent-filter 中设置 [android:autoVerify="true"] 来完成 App Link 域名验证。
高危安全漏洞 已启用远程WebView调试
已启用远程WebView调试 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04c-Tampering-and-Reverse-Engineering.md#debugging-and-tracing Files: kr/co/smartskin/zenbro2014/MainActivity.java, line(s) 1884,39 kr/co/smartskin/zenbro2014/WebviewActivity.java, line(s) 379,17
高危安全漏洞 应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。
应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4 Files: kr/co/smartskin/zenbro2014/b0.java, line(s) 764,790
中危安全漏洞 应用已启用明文网络流量
[android:usesCleartextTraffic=true] 应用允许明文网络流量(如 HTTP、FTP 协议、DownloadManager、MediaPlayer 等)。API 级别 27 及以下默认启用,28 及以上默认禁用。明文流量缺乏机密性、完整性和真实性保护,攻击者可窃听或篡改传输数据。建议关闭明文流量,仅使用加密协议。
中危安全漏洞 Activity 设置了 TaskAffinity 属性
(com.navercorp.android.selective.livecommerceviewer.ui.common.ShoppingLiveViewerOsPipRootActivity) 设置 taskAffinity 后,其他应用可读取发送至该 Activity 的 Intent。为防止敏感信息泄露,建议保持默认 affinity(包名)。
中危安全漏洞 Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) 受权限保护,但应检查权限保护级别。
Permission: com.google.android.c2dm.permission.SEND [android:exported=true] 检测到 Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。
中危安全漏洞 应用程序使用不安全的随机数生成器
应用程序使用不安全的随机数生成器 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-random-number-generators Files: n/d/a/c/g5/i1.java, line(s) 4 n/d/a/c/i5/z.java, line(s) 6 n/d/a/c/k5/f1/v.java, line(s) 16 n/d/a/c/x4/x1.java, line(s) 7 n/d/c/c/v.java, line(s) 7 n/d/c/h/i0.java, line(s) 7 s/h3/a.java, line(s) 3 s/h3/b.java, line(s) 3 s/h3/c.java, line(s) 3 s/h3/d.java, line(s) 4 s/h3/e.java, line(s) 3 s/h3/j/a.java, line(s) 4 s/t2/a0.java, line(s) 6 s/t2/v.java, line(s) 10 u/b0.java, line(s) 11 u/l0/s/e.java, line(s) 9 u/l0/s/i.java, line(s) 5 w/a/a/a/s.java, line(s) 3 w/a/a/a/t.java, line(s) 3
中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
文件可能包含硬编码的敏感信息,如用户名、密码、密钥等 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10 Files: com/naver/prismplayer/j4/n0.java, line(s) 265 com/naver/prismplayer/x1.java, line(s) 381 com/navercorp/android/selective/livecommerceviewer/config/ShoppingLiveViewerSdkManager.java, line(s) 843,859,1008,714,719 com/navercorp/android/selective/livecommerceviewer/data/common/model/ShoppingLiveViewerPagerListResult.java, line(s) 78 com/navercorp/android/selective/livecommerceviewer/data/common/model/ShoppingLiveViewerPagerRequestInfo.java, line(s) 277 com/navercorp/android/selective/livecommerceviewer/data/common/model/ShoppingLiveViewerRequestInfo.java, line(s) 247 com/navercorp/android/selective/livecommerceviewer/data/common/model/contents/ShoppingLiveViewerContentsRecommendLogRequest.java, line(s) 178 com/navercorp/android/selective/livecommerceviewer/data/common/model/contents/ShoppingLiveViewerRecommendProductResult.java, line(s) 317 com/navercorp/android/selective/livecommerceviewer/data/common/model/product/ShoppingLiveExternalProductResult.java, line(s) 576 com/navercorp/android/selective/livecommerceviewer/data/common/model/product/ShoppingLiveProductResult.java, line(s) 734 com/navercorp/android/selective/livecommerceviewer/data/common/model/product/detail/response/ShoppingLiveProductOptionSelectResult.java, line(s) 990,990 com/navercorp/android/selective/livecommerceviewer/data/common/model/shortform/ShoppingLiveViewerShortFormProductItemResult.java, line(s) 635 com/navercorp/android/selective/livecommerceviewer/data/live/model/socket/ShoppingLiveSessionIoProductResult.java, line(s) 463 com/navercorp/android/selective/livecommerceviewer/data/replay/model/extraresult/ShoppingLiveViewerReplayHighlightResult.java, line(s) 201 com/navercorp/android/selective/livecommerceviewer/data/shortclip/model/ShoppingLiveViewerShortClipExternalProductResult.java, line(s) 611 com/navercorp/android/selective/livecommerceviewer/data/shortclip/model/ShoppingLiveViewerShortClipProductResult.java, line(s) 635 com/navercorp/android/selective/livecommerceviewer/data/shortclip/model/rewards/ShoppingLiveViewerShortClipRewardsRequest.java, line(s) 99 com/navercorp/android/selective/livecommerceviewer/livesolution/ShoppingLiveViewerExternalTokenManager.java, line(s) 533,548 com/navercorp/android/selective/livecommerceviewer/tools/ShoppingLiveViewerConstants.java, line(s) 225,310,53,328,331,231,262 com/navercorp/android/selective/livecommerceviewer/ui/common/product/detail/ShoppingLiveViewerProductOptionSelectViewModel.java, line(s) 783,534,580,611,694 com/navercorp/android/selective/livecommerceviewer/ui/common/webview/CommonWebView.java, line(s) 510 com/nhncorp/nstatlog/ace/AceClient.java, line(s) 28 com/nhncorp/nstatlog/ace/SharedPrefParamRepository.java, line(s) 9
中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2 Files: com/naver/nelo/sdk/android/buffer/c.java, line(s) 4,5,37,38,45,46,47 n/d/a/b/l/x/j/a0.java, line(s) 5,6,88,100,383 n/d/a/b/l/x/j/e0.java, line(s) 3,18 n/d/a/b/l/x/j/f0.java, line(s) 4,5,85 n/d/a/c/b5/g.java, line(s) 6,7,30 n/d/a/c/b5/h.java, line(s) 6,75 n/d/a/c/k5/f1/h.java, line(s) 6,55,98 n/d/a/c/k5/f1/n.java, line(s) 7,8,118,132
中危安全漏洞 MD5是已知存在哈希冲突的弱哈希
MD5是已知存在哈希冲突的弱哈希 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4 Files: com/naver/prismplayer/l4/e.java, line(s) 35 com/nhncorp/nstatlog/ClientInfo.java, line(s) 36 n/i/b/e0/j.java, line(s) 197
中危安全漏洞 IP地址泄露
IP地址泄露 Files: com/naver/prismplayer/j4/h3/a.java, line(s) 63 com/naver/prismplayer/j4/h3/b.java, line(s) 1735 com/naver/prismplayer/j4/h3/c.java, line(s) 609 com/naver/prismplayer/j4/h3/d.java, line(s) 9 com/naver/prismplayer/j4/h3/e.java, line(s) 446 kr/co/smartskin/zenbro2014/SettingsActivity.java, line(s) 901,902,903,904,900 m/h/a/k/i/e0.java, line(s) 62 n/d/c/l/e.java, line(s) 29,28
中危安全漏洞 应用程序创建临时文件。敏感信息永远不应该被写进临时文件
应用程序创建临时文件。敏感信息永远不应该被写进临时文件 Files: com/naver/prismplayer/j4/h3/b.java, line(s) 321 n/d/a/c/l5/x0.java, line(s) 203 n/d/c/j/r.java, line(s) 100 s/b3/a0/t.java, line(s) 679,700,704,729 s/b3/q.java, line(s) 129,155
中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage Files: com/navercorp/android/selective/livecommerceviewer/tools/utils/FileUtils.java, line(s) 29 com/navercorp/android/selective/livecommerceviewer/tools/utils/ImageUtils.java, line(s) 139 kr/co/smartskin/zenbro2014/ByappsWebView.java, line(s) 1176 m/j/l/e.java, line(s) 33,50,50 n/e/b/a/b.java, line(s) 126,140,164,212,249
中危安全漏洞 可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息
可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-6 Files: kr/co/smartskin/zenbro2014/ByappsWebView.java, line(s) 2756,1144,2754
中危安全漏洞 SHA-1是已知存在哈希冲突的弱哈希
SHA-1是已知存在哈希冲突的弱哈希 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4 Files: kr/co/smartskin/zenbro2014/MainActivity.java, line(s) 1364 n/i/b/e0/j.java, line(s) 205,213
中危安全漏洞 此应用程序可能会请求root(超级用户)权限
此应用程序可能会请求root(超级用户)权限 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1 Files: com/naver/prismplayer/l4/f.java, line(s) 29,27,28,29,29,29,28,28,29,29,28,29,29 kr/co/smartskin/zenbro2014/MainActivity.java, line(s) 1128
中危安全漏洞 应用程序包含隐私跟踪程序
此应用程序有多个1隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。
中危安全漏洞 此应用可能包含硬编码机密信息
从应用程序中识别出以下机密确保这些不是机密或私人信息 "google_api_key" : "AIzaSyDSU4oDbpprp-n_aLqhf4lD4HyqieVqafU" "google_app_id" : "1:605734268352:android:926f763b63f12209482c25" "google_crash_reporting_api_key" : "AIzaSyDSU4oDbpprp-n_aLqhf4lD4HyqieVqafU" YJVQpmHKa3DIU9QZNI3PJArbEkYxMniH 16a09e667f3bcc908b2fb1366ea957d3e3adec17512775099da2f590b0667322a 1077efec-c0b2-4d02-ace3-3c1e52e2fb4b 258EAFA5-E914-47DA-95CA-C5AB0DC85B11 edef8ba9-79d6-4ace-a3c8-27dcd51d21ed 1e911c7f486649a6bbfbfc13fb07783b e2719d58-a985-b3c9-781a-b030af78d30e wxJzBrnhNeQQaJB2FU4Ez8yYYtNtZiRW 9a04f079-9840-4286-ab92-e65be0885f95
安全提示信息 应用程序记录日志信息,不得记录敏感信息
应用程序记录日志信息,不得记录敏感信息 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs Files: com/naver/prismplayer/api/audioplatform/AudioLog.java, line(s) 117,117,117,117,117 com/naver/prismplayer/b4/o0/i.java, line(s) 181,231 com/naver/prismplayer/f4/d.java, line(s) 128,134,136,139,70,130,242,132 com/naver/prismplayer/f4/g.java, line(s) 64,73,67,61,70,76 com/naver/prismplayer/f4/j.java, line(s) 358,375,368,378 com/naver/prismplayer/nativesupport/NativeSupport.java, line(s) 44,77 com/naver/prismplayer/ui/e0/b.java, line(s) 365 com/navercorp/android/selective/livecommerceviewer/tools/logger/Logger.java, line(s) 157,159,214,221,231,64,66,177,179,78,80,189,128,130,139,141 com/navercorp/android/selective/livecommerceviewer/tools/retrofit/RetrofitErrorUtils.java, line(s) 52,53 com/navercorp/android/selective/livecommerceviewer/ui/common/modalwebview/ShoppingLiveViewerModalBehavior.java, line(s) 868 com/nhncorp/nstatlog/ClientInfo.java, line(s) 56,100 com/nhncorp/nstatlog/WebkitCookieRepository.java, line(s) 28,49 com/nhncorp/nstatlog/ace/AceClient.java, line(s) 194,198,208,193,197,115 com/nhncorp/nstatlog/ace/DummyAceClient.java, line(s) 21 com/nhncorp/nstatlog/ace/SharedPrefParamRepository.java, line(s) 26,25 com/nhncorp/nstatlog/httpclient/HttpGetRequest.java, line(s) 32 com/nhncorp/nstatlog/httpclient/HttpLog.java, line(s) 9,19,8,14,17 kr/co/smartskin/zenbro2014/ByappsApplication.java, line(s) 115,142,187 kr/co/smartskin/zenbro2014/ByappsWebView.java, line(s) 220,518,604,635,815,1048,1087,2688,2695,2721,2818,2850,516,517 kr/co/smartskin/zenbro2014/ClearService.java, line(s) 19,24 kr/co/smartskin/zenbro2014/GifImageView.java, line(s) 175 kr/co/smartskin/zenbro2014/LoginActivity.java, line(s) 125,164,172,176 kr/co/smartskin/zenbro2014/MainActivity.java, line(s) 191,330,340,376,385,387,722,726,773,837,873,883,926,928,998,1270,1289,1319,1333,1368,1371,1374,1409,1481,1510,1582,1595,1623,1671,1699,1705,1706,1707,1722,1751,1786,1790,1792,1796,1819,1826,402,404 kr/co/smartskin/zenbro2014/MyFireBaseMessagingService.java, line(s) 81,83,88,91,94,115,125,130,132 kr/co/smartskin/zenbro2014/NotiReceiver.java, line(s) 85,100,115,130,140,203,233,236,239,249,260,296,297,331,332,347,361 kr/co/smartskin/zenbro2014/NotiSettingsActivity.java, line(s) 68,70,128,136,142,163,205,269 kr/co/smartskin/zenbro2014/PushPopupActivity.java, line(s) 67 kr/co/smartskin/zenbro2014/SettingsActivity.java, line(s) 66,75,119,122,221,231,363,380,453,811,897,906,932,937,958 kr/co/smartskin/zenbro2014/ShoppingLive.java, line(s) 83,96,199,202,244,286,291,298,304,353,399,407,417,431,435,437,439 kr/co/smartskin/zenbro2014/ShoppingLive2.java, line(s) 231,274,308,317,325,336,351,353,359,361 kr/co/smartskin/zenbro2014/ShowMSGActivity.java, line(s) 50 kr/co/smartskin/zenbro2014/SplashActivity.java, line(s) 127 kr/co/smartskin/zenbro2014/TabMenu.java, line(s) 297,459,470 kr/co/smartskin/zenbro2014/WebviewActivity.java, line(s) 185,186,187,188,211,447,486,496 kr/co/smartskin/zenbro2014/a0.java, line(s) 14 kr/co/smartskin/zenbro2014/b0.java, line(s) 184,195,238,239,273,282,452,583,598,619,655,693,740,745,863,867,967,972,985,988,991,992,1010,1086,1093,1105,1112,1148,1024,827,829 kr/co/smartskin/zenbro2014/c0.java, line(s) 42,51,64,87,111,169,177,183,185,209,221,222,226,235,269,277,297,299,330,348,356,357,365,368,377,392,393,394,465,468,492,505,548,549,571,572,574,576,577,591,615 kr/co/smartskin/zenbro2014/d0.java, line(s) 60,70,318,358,359,369,392,440,505,530,547,575,580,593,620,624,101,107,598,601 kr/co/smartskin/zenbro2014/e0.java, line(s) 213,222,230,389,402,425,517,529,35,38,39,40,48,85,88,90,174,251,252,267,268,277,278,318,326,327,328,331,341,342,371,372,467,489,490,500,505 kr/co/smartskin/zenbro2014/f0.java, line(s) 528,554,561,527,553,560,353,589,598 kr/co/smartskin/zenbro2014/i0.java, line(s) 74,102,73,101 kr/co/smartskin/zenbro2014/k.java, line(s) 53,40,45 kr/co/smartskin/zenbro2014/l.java, line(s) 22 kr/co/smartskin/zenbro2014/n.java, line(s) 44,48,58,62,66 kr/co/smartskin/zenbro2014/o.java, line(s) 36,41,46 kr/co/smartskin/zenbro2014/o0.java, line(s) 34,48 kr/co/smartskin/zenbro2014/p0.java, line(s) 305,314,319,584,85,97,98,110,137,171,189,190,272,279,348,353,470,491,501 kr/co/smartskin/zenbro2014/q0.java, line(s) 82,100,148,156,172,281 kr/co/smartskin/zenbro2014/r0.java, line(s) 59 kr/co/smartskin/zenbro2014/w.java, line(s) 44,103,113 kr/co/smartskin/zenbro2014/x.java, line(s) 109,134,135 kr/co/smartskin/zenbro2014/y.java, line(s) 97,455,470 kr/co/smartskin/zenbro2014/z.java, line(s) 152,169,195,217,253,40 m/a/c/a/a.java, line(s) 298,301 m/a/f/g.java, line(s) 142,175,256 m/b0/b.java, line(s) 92 m/c/b/a.java, line(s) 127,131 m/c0/e1.java, line(s) 35,120 m/c0/q.java, line(s) 49,61,76 m/c0/u0.java, line(s) 38,47,49 m/d/b/d.java, line(s) 259 m/d/b/i.java, line(s) 36,46,56,65,74,83 m/d/b/l.java, line(s) 91 m/d/c/h.java, line(s) 107,120 m/d/c/j.java, line(s) 29 m/d/c/u.java, line(s) 109,47,94,104 m/d0/c/a/c.java, line(s) 197,200 m/d0/c/a/e.java, line(s) 96,111 m/d0/c/a/i.java, line(s) 269,272,363,368,893 m/f/c.java, line(s) 68,90 m/h/a/a.java, line(s) 286,290,293 m/h/a/e.java, line(s) 92,96,369,495,1004 m/h/a/j.java, line(s) 80,310,314,317 m/h/a/k/c.java, line(s) 1087 m/h/a/k/g/c.java, line(s) 288,292 m/h/a/k/g/d.java, line(s) 415 m/h/a/k/g/e.java, line(s) 122 m/h/a/k/h/c.java, line(s) 35,42,45,48 m/h/a/k/i/d.java, line(s) 54 m/h/a/k/i/e0.java, line(s) 47,23,31,42 m/h/a/k/i/i.java, line(s) 37,38,48,116,117,127,195,196,206 m/h/a/k/i/p.java, line(s) 87 m/h/a/k/i/q.java, line(s) 58,59 m/h/a/k/i/t.java, line(s) 311 m/h/a/l/b.java, line(s) 21 m/h/a/l/c.java, line(s) 108 m/h/a/l/g.java, line(s) 59,273 m/h/a/m/p.java, line(s) 187 m/h/a/m/r.java, line(s) 418,446 m/h/a/n/p/e.java, line(s) 267 m/h/b/a/b.java, line(s) 230 m/h/b/a/c.java, line(s) 67,84,221,236,251 m/h/c/a/a.java, line(s) 96,99 m/h/c/a/c.java, line(s) 90,92 m/h/c/a/d.java, line(s) 141,143 m/h/c/a/f.java, line(s) 166,168 m/h/c/b/b0.java, line(s) 284,285 m/h/c/b/c0.java, line(s) 272,97 m/h/c/b/d.java, line(s) 137,179,19,25,30,37,40,48,60,65,70,191 m/h/c/b/e.java, line(s) 350 m/h/c/b/h.java, line(s) 102 m/h/c/b/i.java, line(s) 207,273,339 m/h/c/b/j.java, line(s) 35,118 m/h/c/b/k.java, line(s) 143,148,313 m/h/c/b/m.java, line(s) 114 m/h/c/b/n.java, line(s) 109,212,219 m/h/c/b/o.java, line(s) 196,203 m/h/c/b/p.java, line(s) 184 m/h/c/b/t.java, line(s) 1368,1571,1591,1594,1599,1602,1638,1870,2218,2853,637,663,665,717,771,1583,1657,2845,1614,1617,1625,1628,1631,1958,2721 m/h/c/b/v.java, line(s) 489,525,858,1045,1525,1569,255,153,314,514,1035,1036,1060,1061,1067 m/h/c/b/y.java, line(s) 261 m/h/d/a/e.java, line(s) 402,796 m/j/e/a0.java, line(s) 65,124 m/j/e/d0.java, line(s) 103,106 m/j/e/e0.java, line(s) 122 m/j/e/o.java, line(s) 535,540 m/j/e/y.java, line(s) 90 m/j/e/z.java, line(s) 48,83 m/j/l/e.java, line(s) 52 m/j/l/g.java, line(s) 58,62,66,93,97,101 m/j/l/t.java, line(s) 75,90,109,129,143 m/j/o/e.java, line(s) 72,88,90,103,105,126,129 m/j/q/a.java, line(s) 26,31,54,59,64,72,77,93 m/j/q/f.java, line(s) 19 m/j/r/b0.java, line(s) 142,225 m/j/r/c1.java, line(s) 95,110,135,170,195,220,245 m/j/r/l.java, line(s) 81 m/j/r/l1.java, line(s) 994,1038,789,801,808,817,46,69,1029 m/j/r/n1/d.java, line(s) 230 m/j/r/p1/c.java, line(s) 200 m/j/r/v.java, line(s) 49,58 m/j/r/x0.java, line(s) 2459,2587,2857,1687,1694,1696,1698,2152,2339,2458 m/j/r/y0.java, line(s) 53,67 m/l/c/d.java, line(s) 166 m/m/b/b.java, line(s) 59,120,134 m/m/b/c.java, line(s) 28,77 m/m/b/e.java, line(s) 144 m/q/b/a.java, line(s) 988,1001,1130,1194,1326,1476,1479,1499,1505,1595,1711,1727,1738,1745,1851,1927,1985,1987,2384,2436,2501,2813,1464,1470,494,1110,1114,1349,1887,1895,2099,2324,2331,2394,2402,2674 m/t/a/a.java, line(s) 187,217,226 m/t/b/a.java, line(s) 30 m/u/b/b.java, line(s) 57,72,80,105,212,232,360,381,426,432,453,64 m/u/c/d.java, line(s) 82 m/v/b/a.java, line(s) 158,163,170,174,190,200 m/w/a.java, line(s) 151,398,409 n/a/a/c/a.java, line(s) 7,13,8,14 n/a/b/x.java, line(s) 96,100,104,11,110,115,120,124 n/b/a/a/a0/a.java, line(s) 39 n/b/a/a/a0/b.java, line(s) 61,76,77,96,100,103,106,109,111,113,117,120,122,124,127,141,143,145,149,151,153,155,165,185,217,223,228 n/b/a/a/a0/c.java, line(s) 32 n/b/a/a/a0/d.java, line(s) 39 n/b/a/a/a0/e.java, line(s) 41,45,54,88,91,95,107,112,152,155,159,165,170 n/b/a/a/b0/i.java, line(s) 53,66 n/b/a/a/d.java, line(s) 28 n/b/a/a/e.java, line(s) 25 n/b/a/a/l.java, line(s) 34 n/b/a/a/n.java, line(s) 27 n/b/a/a/o.java, line(s) 55 n/b/a/a/u.java, line(s) 281,350 n/d/a/b/l/v/a.java, line(s) 10,14,18,22,26,34,38 n/d/a/c/l5/z.java, line(s) 44,56,82,113 n/d/a/e/b/a/a.java, line(s) 289,308,342 n/d/a/e/b/a/b.java, line(s) 40,55,65,76 n/d/a/e/b/a/c.java, line(s) 16,29,42,52 n/d/a/e/e/n.java, line(s) 23 n/d/a/e/f/e/k.java, line(s) 24 n/d/a/e/h/a.java, line(s) 37,51,49,76,87 n/d/a/e/j/b.java, line(s) 25 n/d/a/e/j/d.java, line(s) 69,135 n/d/a/f/b/h.java, line(s) 66 n/d/a/f/e/a.java, line(s) 217 n/d/a/f/r/d.java, line(s) 176,209 n/d/a/f/s/b.java, line(s) 90 n/d/a/f/u/j.java, line(s) 285 n/d/a/f/x/l.java, line(s) 865,895 n/d/a/f/x/w/l.java, line(s) 794,824 n/d/d/e.java, line(s) 170,268 n/e/b/b/j.java, line(s) 73,77 n/e/c/a/a/m/d/b.java, line(s) 132 n/i/b/e0/h.java, line(s) 95,396,400 n/j/a/c0.java, line(s) 525,538 n/j/a/f0.java, line(s) 21,25,29,31,34,36,40,42,45,62,70,72,74,78,82,87,89,93,98,100,104,109,111,116,118,120,142,144,146,149,152,159,226,228 s/b3/d.java, line(s) 14,19,24,29,34,39,44,49,54,60,65,70,75,80,85,90,95,100,105,110,116 t/b/h4/b.java, line(s) 80 u/l0/f.java, line(s) 718 u/l0/p/i/c.java, line(s) 56,56,71 w/a/a/a/z.java, line(s) 229 w/d/n.java, line(s) 58,60,61,62,63,65,66,67,69,70,71,73,74,75,77,78,79,80,81,82,83,84,117,118,119,122,124,125,126,150,151,152,153,154,155,156,157,158,159,161,162,163,165,166,167,169,170,171,173,174,175,177,178,179,181,182,183,185,186,187,189,190,191,193,194,195,197,198,199,201,202,203,205,206,207,209,210,211,212,213,214,216,217,218,220,221,222,224,225,226,228,229,230,231,232,235,236,237,238,239,241,242,243,244,246,247,248,249,251,252,254,256,258,259,260,262,263,264,265,266,267,268,269,270,271,272,273,274,275,276,277,278,279,280,282,283,284,288,290,296,297,298,300,301,303,304,306,307,321,322,324,326,327,328,330,331,332,333,334,340,344,346,347,348,349,350,351,352,353,354,355,356,357,358,360,362,364,365,366,367,368,369,370,371,372,375,379,381,383,385,387,392,394,396,398,400,402,404,406,408,410,412,414,416,418,420,422,424,426,428,432,434,438,440,444,446,448,450,452,454,456,458,460,462,464,466,468,470,473,477,480,482,485
安全提示信息 应用程序可以写入应用程序目录。敏感信息应加密
应用程序可以写入应用程序目录。敏感信息应加密 Files: com/naver/prismplayer/y2.java, line(s) 102,102 n/e/c/a/a/n/d.java, line(s) 34,34
安全提示信息 此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它
此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard Files: com/navercorp/android/selective/livecommerceviewer/tools/extension/ContextExtensionKt.java, line(s) 4,127
已通过安全项 此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击
此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#testing-custom-certificate-stores-and-certificate-pinning-mstg-network-4 Files: com/naver/prismplayer/j4/h3/b.java, line(s) 993,971,991,993,990,990 com/navercorp/android/selective/livecommerceviewer/tools/retrofit/BaseRetrofit.java, line(s) 36,36 u/l0/p/c.java, line(s) 118,117,116 u/l0/p/d.java, line(s) 160,149,159,170,158,158 u/l0/p/g.java, line(s) 119,118,117,117 u/l0/p/h.java, line(s) 270,257,269,268,268
已通过安全项 此应用程序可能具有Root检测功能
此应用程序可能具有Root检测功能 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1 Files: com/naver/prismplayer/l4/f.java, line(s) 27,27,27,27,27,27 kr/co/smartskin/zenbro2014/MainActivity.java, line(s) 1169,1190,1128,1128,1128,1128,1128,1128,1128
已通过安全项 Firebase远程配置已禁用
Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/605734268352/namespaces/firebase:fetch?key=AIzaSyDSU4oDbpprp-n_aLqhf4lD4HyqieVqafU ) 已禁用。响应内容如下所示: { "state": "NO_TEMPLATE" }
重点安全关注 应用程序可能与位于OFAC制裁国家 (中国) 的服务器 (pagead2.googlesyndication.com) 通信。
{'ip': '180.163.150.38', 'country_short': 'CN', 'country_long': '中国', 'region': '上海', 'city': '上海', 'latitude': '31.224333', 'longitude': '121.468948'}
综合安全基线评分总结

젠브로 v2.8
Android APK
50
综合安全评分
中风险