导航菜单

应用安全检测报告

应用安全检测报告,支持文件搜索、内容检索和AI代码分析

移动应用安全检测报告

应用图标

MedEd v5.3.6

Android APK 81e20f21...
51
安全评分

安全基线评分

51/100

低风险

综合风险等级

风险等级评定
  1. A
  2. B
  3. C
  4. F

应用存在一定安全风险,建议优化

漏洞与安全项分布

2 高危
28 中危
2 信息
2 安全

隐私风险评估

4
第三方跟踪器

中等隐私风险
检测到少量第三方跟踪器


检测结果分布

高危安全漏洞 2
中危安全漏洞 28
安全提示信息 2
已通过安全项 2
重点安全关注 0

高危安全漏洞 如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击

如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-7

Files:
com/freshchat/consumer/sdk/activity/ArticleDetailActivity.java, line(s) 358,15
com/freshchat/consumer/sdk/activity/BotFaqDetailsActivity.java, line(s) 118,12
com/freshchat/consumer/sdk/activity/FAQDetailsActivity.java, line(s) 136,11
com/penpencil/physicswallah/feature/batch/presentation/fragment/NeetPgDescriptionFragment.java, line(s) 360,12
com/penpencil/player/webYoutube/VideoEnabledWebView.java, line(s) 111,14
in/juspay/hypersdk/core/DynamicUI.java, line(s) 140,321,8
in/juspay/hypersdk/safe/JuspayWebView.java, line(s) 52,9,10

高危安全漏洞 该文件是World Writable。任何应用程序都可以写入文件

该文件是World Writable。任何应用程序都可以写入文件
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#testing-local-storage-for-sensitive-data-mstg-storage-1-and-mstg-storage-2

Files:
in/juspay/hypersdk/core/AndroidInterface.java, line(s) 604
in/juspay/hypersdk/data/KeyValueStore.java, line(s) 13

中危安全漏洞 Activity (com.penpencil.physicswallah.feature.revenue.presentation.activity.MyPurchaseWebViewActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.penpencil.physicswallah.feature.auth.presentation.activity.NeetPGAuthActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.penpencil.physicswallah.feature.deeplink.ui.DeepLinkActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.penpencil.physicswallah.broadcast.SmsBroadcastReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.gms.auth.api.phone.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (com.google.android.exoplayer2.scheduler.PlatformScheduler$PlatformSchedulerService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (com.google.android.exoplayer2.scheduler.PlatformScheduler$PlatformSchedulerService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Activity (com.penpencil.k8_timeless.ui.K8MainActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.penpencil.k8_timeless.ui.meded.MededVitalsActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.onboarding.activities.NeetPGOnboarding) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (in.juspay.hypersdk.core.CustomtabResult) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.moengage.sdk.debugger.MoEDebuggerActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Service (com.google.android.gms.auth.api.signin.RevocationBoundService) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Activity (androidx.compose.ui.tooling.PreviewActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Service (androidx.work.impl.background.systemjob.SystemJobService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.profileinstaller.ProfileInstallReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等

文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10

Files:
coil/memory/MemoryCache.java, line(s) 75
com/freshchat/consumer/sdk/beans/fragment/TemplateFragment.java, line(s) 41
com/gyanguru/ui/feedback/StatusRating.java, line(s) 70
com/onboarding/data/remote/dto/BannerCohortDto.java, line(s) 108
com/onboarding/data/remote/dto/FilterDto.java, line(s) 123
com/onboarding/data/remote/dto/OnboardingQuestionDto.java, line(s) 163
com/onboarding/data/remote/dto/OptionsDto.java, line(s) 146
com/onboarding/data/remote/dto/PossibleValueDto.java, line(s) 78
com/onboarding/domain/model/OnboardingQuestion.java, line(s) 118
com/onboarding/domain/model/Options.java, line(s) 114
com/penpencil/core/data/dto/SignedURLResponse.java, line(s) 69
com/penpencil/k8_timeless/domain/model/StatusRating.java, line(s) 70
com/penpencil/network/models/ChangePasswordPayload.java, line(s) 71
com/penpencil/network/models/CreatePasswordPayload.java, line(s) 72
com/penpencil/network/models/FilterData.java, line(s) 114
com/penpencil/network/models/OtpPayload.java, line(s) 93
com/penpencil/network/models/PossibleValueData.java, line(s) 74
com/penpencil/network/models/PreviewVideoId.java, line(s) 146
com/penpencil/network/response/AttachmentIds.java, line(s) 127
com/penpencil/network/response/BannerCohortDto.java, line(s) 102
com/penpencil/network/response/BatchTopicContentData.java, line(s) 683
com/penpencil/network/response/FileId.java, line(s) 239
com/penpencil/network/response/FilterDto.java, line(s) 122
com/penpencil/network/response/Image.java, line(s) 136
com/penpencil/network/response/ImageLanguageDto.java, line(s) 103
com/penpencil/network/response/ImageUploadData.java, line(s) 147
com/penpencil/network/response/LoginBody.java, line(s) 138,40
com/penpencil/network/response/PossibleValueDto.java, line(s) 77
com/penpencil/network/response/PreviewVideoId.java, line(s) 181
com/penpencil/network/response/QuestionFile.java, line(s) 144
com/penpencil/network/response/SolutionVideoId.java, line(s) 129
com/penpencil/network/response/teachers/TeachersDoubtDTO.java, line(s) 210
com/penpencil/network/utils/SecureVideoFetchTokenResult.java, line(s) 161
com/penpencil/physicswallah/feature/auth/domain/mapper/data/model/ImageId.java, line(s) 163
com/penpencil/physicswallah/feature/auth/presentation/args/ForgotPasswordArgs.java, line(s) 49
com/penpencil/physicswallah/feature/auth/presentation/viewmodel/AuthContracts$Event$LoginSuccessMoEngage.java, line(s) 86
com/penpencil/physicswallah/feature/auth/presentation/viewmodel/AuthContracts$Event$SignUpSuccessMoEngage.java, line(s) 69
com/penpencil/physicswallah/feature/auth/presentation/viewmodel/AuthContracts$Event.java, line(s) 179,226,358,128
com/penpencil/physicswallah/feature/auth/presentation/viewmodel/AuthContracts$State.java, line(s) 398,399
com/penpencil/physicswallah/feature/batch/data/model/FilterDto.java, line(s) 101
com/penpencil/physicswallah/feature/batch/data/model/MetaBatchesData.java, line(s) 112
com/penpencil/physicswallah/feature/batch/data/model/PossibleValueDto.java, line(s) 78
com/penpencil/physicswallah/feature/batch/data/model/PreviewImageData.java, line(s) 112
com/penpencil/physicswallah/feature/batch/data/model/PreviewImageDto.java, line(s) 120
com/penpencil/physicswallah/feature/home/data/model/Banner.java, line(s) 89
com/penpencil/physicswallah/feature/home/data/model/ImageId.java, line(s) 163
com/penpencil/physicswallah/feature/home/domain/model/Banner.java, line(s) 81
com/penpencil/physicswallah/feature/library/data/model/FileIdDto.java, line(s) 163
com/penpencil/physicswallah/feature/library/data/model/ImageId.java, line(s) 168
com/penpencil/physicswallah/feature/mededWidget/commons/model/FileId.java, line(s) 145
com/penpencil/physicswallah/feature/mededWidget/commons/model/Image.java, line(s) 163
com/penpencil/physicswallah/feature/quiz/domain/model/StatusRating.java, line(s) 70
com/penpencil/physicswallah/feature/revenue/data/model/ImageId.java, line(s) 82
com/penpencil/physicswallah/feature/revenue/data/model/Invoice.java, line(s) 95
com/penpencil/physicswallah/feature/revenue/data/model/PlanTagConfig.java, line(s) 144
com/penpencil/physicswallah/feature/search/data/model/FileId.java, line(s) 212
com/penpencil/physicswallah/feature/search/data/model/ImageId.java, line(s) 141
com/penpencil/player_engagement/live_chat/feature/mqtt/MqttConfigData.java, line(s) 107
com/penpencil/player_engagement/live_chat/network/response/SenderName.java, line(s) 91
com/penpencil/three_d_models/data/dto/ImageId.java, line(s) 145
com/penpencil/ts/data/local/entity/Image.java, line(s) 98
com/penpencil/ts/data/remote/dto/AttachmentId.java, line(s) 145
com/penpencil/ts/data/remote/dto/En.java, line(s) 104
com/penpencil/ts/data/remote/dto/FileId.java, line(s) 104
com/penpencil/ts/data/remote/dto/FileIdDto.java, line(s) 120
com/penpencil/ts/data/remote/dto/Hi.java, line(s) 104
com/penpencil/ts/data/remote/dto/HiEn.java, line(s) 104
com/penpencil/ts/data/remote/dto/Icon.java, line(s) 104
com/penpencil/ts/data/remote/dto/IconData.java, line(s) 89
com/penpencil/ts/data/remote/dto/Image.java, line(s) 104
com/penpencil/ts/data/remote/dto/ImageId.java, line(s) 104
com/penpencil/ts/data/remote/dto/ImageIdDto.java, line(s) 120
com/penpencil/ts/data/remote/dto/ImageIdItemDto.java, line(s) 104
com/penpencil/ts/data/remote/dto/QuestionFileIdDto.java, line(s) 104
com/penpencil/ts/data/remote/dto/ScheduleFileIdDto.java, line(s) 120
com/penpencil/ts/data/remote/dto/TestPassFilterDto.java, line(s) 108
com/penpencil/ts/data/remote/dto/TestPassSubFilters.java, line(s) 89
com/penpencil/ts/domain/model/En.java, line(s) 93
com/penpencil/ts/domain/model/FileId.java, line(s) 119
com/penpencil/ts/domain/model/Hi.java, line(s) 93
com/penpencil/ts/domain/model/HiEn.java, line(s) 93
com/penpencil/ts/domain/model/QuestionFileId.java, line(s) 93
com/penpencil/ts/domain/model/StatusRating.java, line(s) 70
com/penpencil/ts/domain/model/TestFilter.java, line(s) 126
com/penpencil/ts/domain/model/TestPassSubFilters.java, line(s) 105
com/truecaller/android/sdk/common/TrueException.java, line(s) 16

中危安全漏洞 应用程序使用不安全的随机数生成器

应用程序使用不安全的随机数生成器
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-random-number-generators

Files:
com/appsflyer/internal/AFb1gSDK.java, line(s) 14
com/freshchat/consumer/sdk/service/c/aa.java, line(s) 8
com/freshchat/consumer/sdk/util/cc.java, line(s) 36
com/penpencil/player_engagement/live_chat/ui/fragment/LiveChatFragment.java, line(s) 117

中危安全漏洞 不安全的Web视图实现。可能存在WebView任意代码执行漏洞

不安全的Web视图实现。可能存在WebView任意代码执行漏洞
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#testing-javascript-execution-in-webviews-mstg-platform-5

Files:
com/penpencil/physicswallah/feature/player/ui/activity/a.java, line(s) 174,177,168
com/penpencil/physicswallah/feature/revenue/presentation/activity/MyPurchaseWebViewActivity.java, line(s) 296,285
com/penpencil/physicswallah/feature/revenue/presentation/activity/WebViewActivity.java, line(s) 106,101
com/penpencil/player/webYoutube/VideoEnabledWebView.java, line(s) 98,87,146
in/juspay/hypersdk/core/DynamicUI.java, line(s) 78,101,164,76
in/juspay/hypersdk/safe/Godel.java, line(s) 331,570,564

中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库

应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2

Files:
com/freshchat/consumer/sdk/c/b.java, line(s) 6,7,8,35,67,76
com/freshchat/consumer/sdk/c/e.java, line(s) 6,321
com/freshchat/consumer/sdk/c/k.java, line(s) 6,173
com/freshchat/consumer/sdk/c/l.java, line(s) 6,129,176
com/freshchat/consumer/sdk/c/n.java, line(s) 6,102,278,431
com/freshchat/consumer/sdk/c/w.java, line(s) 5,6,126,133,297,384

中危安全漏洞 应用程序创建临时文件。敏感信息永远不应该被写进临时文件

应用程序创建临时文件。敏感信息永远不应该被写进临时文件


Files:
com/freshchat/consumer/sdk/util/as.java, line(s) 214
com/freshchat/consumer/sdk/util/co.java, line(s) 21

中危安全漏洞 MD5是已知存在哈希冲突的弱哈希

MD5是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/freshchat/consumer/sdk/util/cc.java, line(s) 203
in/juspay/hypersdk/security/EncryptionHelper.java, line(s) 146,224

中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据

应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage

Files:
com/freshchat/consumer/sdk/util/as.java, line(s) 17
com/freshchat/consumer/sdk/util/cc.java, line(s) 151

中危安全漏洞 可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息

可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-6

Files:
com/penpencil/physicswallah/feature/player/ui/activity/a.java, line(s) 169,168
com/penpencil/physicswallah/feature/revenue/presentation/activity/MyPurchaseWebViewActivity.java, line(s) 291,285
in/juspay/hypersdk/safe/Godel.java, line(s) 577,564

中危安全漏洞 Firebase远程配置已启用

Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/964603495685/namespaces/firebase:fetch?key=AIzaSyD4zHEh5cAoT526uauwPVvvkNtgBHUlTyU ) 已启用。请确保这些配置不包含敏感信息。响应内容如下所示:

{
    "entries": {
        "account_deletion_config": "{\"is_enabled\":true, \"reasons\":[\"I am not using this account anymore\",\"Account Security Concerns\",\"Privacy Concerns\",\"I have open issues with MedEd\",\"Others\"]}",
        "account_deletion_otp_timer_duration": "45000",
        "ai_guru_cohort_config": "[{\"courseYear\":\"1\",\"courseExam\":\"FMGE\"},{\"courseYear\":\"1\",\"courseExam\":\"NEET_PG\"},{\"courseYear\":\"2\",\"courseExam\":\"FMGE\"},{\"courseYear\":\"2\",\"courseExam\":\"NEET_PG\"},{\"courseYear\":\"3\",\"courseExam\":\"FMGE\"},{\"courseYear\":\"3\",\"courseExam\":\"NEET_PG\"},{\"courseYear\":\"4\",\"courseExam\":\"FMGE\"},{\"courseYear\":\"4\",\"courseExam\":\"NEET_PG\"},{\"courseYear\":\"internMode\",\"courseExam\":\"FMGE\"},{\"courseYear\":\"internMode\",\"courseExam\":\"NEET_PG\"},{\"courseYear\":\"postIntern\",\"courseExam\":\"FMGE\"},{\"courseYear\":\"postIntern\",\"courseExam\":\"NEET_PG\"}]",
        "ai_guru_onboarding_config": "{\"is_enabled\":true,\"data\":{\"mode\":\"GENERAL\",\"title\":\"Meet MedEd AI Guru!\",\"sub_title\":\"I'm here to guide you through your learning journey, 24/7 📚✨\",\"features\":[{\"type\":\"Instant help, no waiting!\",\"description\":\"Get assistance without delays\",\"icon\":\"https://static.pw.live/5eb393ee95fab7468a79d189/23ac018c-62c2-4da8-a284-066621018d40.png\"},{\"type\":\"Stuck on a problem?\",\"description\":\"Ask anything, from puzzles to mysteries.\",\"icon\":\"https://static.pw.live/5eb393ee95fab7468a79d189/7d66e6a5-fa25-45f4-b0e6-d8483f20094f.png\"},{\"type\":\"Boost your understanding!\",\"description\":\"Dive deep into concepts with personalised explanations and examples.\",\"icon\":\"https://static.pw.live/5eb393ee95fab7468a79d189/0d3d17bc-992c-4beb-8818-506ca892a282.png\"},{\"type\":\"I'm still learning!\",\"description\":\"As of now, I can assist you with academic queries related to Anatomy, Biochemistry &  Physiology. I am actively training on other subjects.\",\"icon\":\"https://static.pw.live/5eb393ee95fab7468a79d189/a9a32f35-96f4-478e-bf62-17938289db39.png\"}]}}",
        "android_app_cache_enabled": "true",
        "android_app_cache_max_age": "3600",
        "android_is_meded_store_enabled": "true",
        "auth_V3": "true",
        "auth_cookies_config": "{\"enabled\":true, \"cookie_expiry_time_hr\": 4, \"device_detail_expiry_time_hr\": 168}",
        "basic_calculator_web_url": "https://widgets.pw.live/calculator/basic",
        "bottom_nav_tabs": "Home,Videos,QBank,Test,Batches:Home",
        "bypass_plans": "{\"batchIds\":[\"64f86b942baa8f00185acef5\",\"67e3d9cf4dacd2cde4761048\",\"67e50fcbac833aeaff01f69d\"]}",
        "comment_char_limit": "300",
        "concurrent_download_limit": "3",
        "disable_bookmark_feature": "false",
        "enable_meded_store_web": "true",
        "enable_web_batch_videos": "false",
        "free_trial_config": "{ \"isEnabled\":true , \"countDownTime\":8, \"maxSessions\":3 }",
        "free_trial_expiry_config": "{\"isEnabled\": true, \"maxFrequencyPerDay\": 3, \"maxDaysAfterExpiry\": 5 }",
        "gyan_guru_feedback_tags": "{\"feedbackEnable\":true,\"tags\":[{\"rating\":1,\"question\":\"What went wrong?\",\"tags\":[\"Poor Explanations\",\"Incorrect Answers\",\"Wrong Information\",\"Slow Response\",\"Others\"]},{\"rating\":2,\"question\":\"What went wrong?\",\"tags\":[\"Poor Explanations\",\"Incorrect Answers\",\"Wrong Information\",\"Slow Response\",\"Others\"]},{\"rating\":3,\"question\":\"What went wrong?\",\"tags\":[\"Poor Explanations\",\"Incorrect Answers\",\"Wrong Information\",\"Slow Response\",\"Others\"]},{\"rating\":4,\"question\":\"What went well?\",\"tags\":[\"Clear Explanations\",\"Helpful Answers\",\"Easy to use\",\"Quick help\",\"Others\"]},{\"rating\":5,\"question\":\"What went well?\",\"tags\":[\"Clear Explanations\",\"Helpful Answers\",\"Easy to use\",\"Quick help\",\"Others\"]}]}",
        "iOSChatSocketActive": "false",
        "iOSChatWebSocketActive": "false",
        "iOSEmojiMqttActive": "true",
        "iOSPollMqttActive": "true",
        "iOSPollSocketActive": "false",
        "iOSPollWebSocketActive": "false",
        "iOS_enable_new_video_settings": "false",
        "iOS_mqtt_poll_isActive": "true",
        "ios_aiGuru_prod_url": "https://ai-guru-mf.pw.live/ai-guru",
        "ios_buynow_alert": "true",
        "ios_buynow_alert_text": "Thanks for choosing us. Keep up your learning.",
        "ios_enableIAP": "true",
        "ios_free_trial_enable": "true",
        "ios_hlsDownloadActive": "true",
        "ios_hlsDownloadActiveBatches": "",
        "ios_ignore_Resolutions": "\"90\"",
        "ios_in_app_rating_enable": "true",
        "ios_isMyPurchaseEnable": "true",
        "ios_isStoreEnable": "true",
        "ios_is_clinical_corner_enabled": "true",
        "ios_is_medverse_3d_enabled": "true",
        "ios_is_sentry_enabled": "true",
        "ios_meded_store_url": "https://meded.pw.live/store",
        "ios_mqtt_chat_isActive": "true",
        "ios_myPurchase_url": "https://help-centre.pw.live/mypurchase",
        "ios_pip_enable": "true",
        "is_clinical_corner_enabled": "true",
        "is_custom_module_enabled": "true",
        "is_custom_module_enabled_web": "true",
        "is_farre_enabled": "true",
        "is_medverse_3d_enabled": "true",
        "is_thankyou_page_enabled": "false",
        "is_vitals_enabled": "true",
        "ivr_number": "07948223345",
        "mqtt_configs_v4": "{\"baseurl\":\"wss://emqx.penpencil.net/mqtt\",\"password\":\"gTK8Ei+3Yh$5Soq\",\"client-id\":\"mqtt-android-\",\"isEnabled\":true}",
        "my_purchase_enabled_android": "true",
        "my_purchase_enabled_web": "true",
        "neetpg_enable_fresh_chat": "true",
        "non_zip_enabled_batches_v2": "ALL,65c4be5eb334880018f90295,67b9ecfa99c67fe800210194,63ef71dfd978e80018dfc3f1,651be6f902b75d0018b529ee,668e722bbce8d90018bde1d4,6673f8c44f7e3b0018fae9a2,66ed2c0f382e7d7510a0bb85,63ef727c750a800018174266,64f86b942baa8f00185acef5,67a5eca75ba4b832d63c9144,63ef4dc205b9f000182a3995,68701d74307b4f8401c7dbc6,6744324cab8b661ebf7b0ca1,686529001dc437d30762eae5,6400b23afbefd2001899b23f,63f38ccea642a30018a857a2,640078a1c05d840018e2cb29,66d082e91b4ff300184c5646,65dd924e5e49ce0018c554ce,63f61e4a9ac9e40018d0d864,64007aa1df120a0018c3c59a,63ee149f79755a0019dadd01,64008d77df120a0018c4194e,6400780bdf120a0018c3c34c,66d191b141729f001840e19a,645ce94064c79200183cc72d,6729ce9fe83896a9510990be,63f61ca69ac9e40018d0d7c9,6411992a1d2dfc0018ae0eea,678b54000f5475aadaad34e4,6597dc87ef63c400189a85b6,67bdad95dd4e878716e018cf,6541e595aa31d00018418679,67ac58a96126f986eb401db4,676a7b5081691200bf273bca,6516684188c6bc0019523861,67b9ecfa99c67fe800210194",
        "offline_video_download_cap": "20",
        "player_config": "{\"enable_uwebsocket\":false}",
        "player_live_chat_config_data": "{\"min_refresh_send_emoji_in_seconds\":3,\"max_refresh_send_emoji_in_seconds\":10,\"receive_emoji_time_interval_in_seconds\":5,\"enable_emoji\":false,\"enable_image_attach\":false,\"attach_image_max_size\":5,\"is_uwebsocket_enabled_for_emoji\":false,\"is_uwebsocket_enabled_for_chat_meta\":false,\"is_uwebsocket_enabled_for_chat_message\":false}",
        "player_transition_config": "{\"enableExcludeChildrenConfig\":true,\"enableExcludeTargetConfig\":false,\"enableTransition\":false}",
        "quiz_max_attempt_time_ms": "45000",
        "scientific_calculator_web_url": "https://calculator-dev.penpencil.co/",
        "server_down_info": "{ \"message\":\"Server is Under Maintenance\", \"timeInMin\":30 }",
        "show_in_app_rating_popup": "true",
        "slide_image_base_url": "https://slide-image.pw.live",
        "suggested_videos_date_enabled": "false",
        "suggested_videos_duration_enabled": "false",
        "teacher_transition_bottom_sheet_enable": "true",
        "telegram_link": "https://t.me/pwmeded ",
        "test_proctoring_count": "5",
        "three_d_web_url": "https://meded.pw.live/3d-model",
        "video_cookies_enabled": "true",
        "video_secure_cdn_config": "{\"enable\": false,   \"cdn_to_replace\": \"d1d34p8vz63oiq.cloudfront.net\",   \"secure_cdn\": \"d213rja32k2s4u.cloudfront.net\"}",
        "web_is_clinical_corner_enabled": "true",
        "web_is_medverse_3d_enabled": "true",
        "whatsapp_disabled_country_group": "[\"CN\",\"KP\",\"SY\",\"QA\",\"IN\"]"
    },
    "state": "UPDATE",
    "templateVersion": "323"
}

中危安全漏洞 应用程序包含隐私跟踪程序

此应用程序有多个4隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。

中危安全漏洞 此应用可能包含硬编码机密信息

从应用程序中识别出以下机密确保这些不是机密或私人信息
凭证信息=> "FRESH_CHAT_APP_KEY" : "@7F1404FB"
凭证信息=> "HANSEL_APP_KEY" : "@7F140623"
凭证信息=> "HANSEL_APP_ID" : "@7F140622"
凭证信息=> "FRESH_CHAT_APP_ID" : "@7F1404FA"
"com.google.firebase.crashlytics.mapping_file_id" : "1e9622bafcca413fab8e2ef68d0aac25"
"downloading_key" : "Downloading"
"firebase_freshchat_api_key" : "AIzaSyD9BBlqgAcGJ-h8X-L3n-BjhVw16jQVQpg"
"firebase_freshchat_application_id" : "1:47266157193:android:81de3bdf097b19ff576c58"
"firebase_freshchat_gcm_sender_id" : "47266157193"
"firebase_freshchat_project_id" : "freshchat-9eb66"
"fresh_chat_app_id" : "08540689-360a-450a-a10b-a9c27b687060"
"fresh_chat_app_key" : "ca979b77-265b-4343-97b9-956be54c3989"
"freshchat_file_provider_authority" : "xyz.penpencil.neetPG.provider"
"google_api_key" : "AIzaSyD4zHEh5cAoT526uauwPVvvkNtgBHUlTyU"
"google_app_id" : "1:964603495685:android:8585f25e0094c239dfe36c"
"google_crash_reporting_api_key" : "AIzaSyD4zHEh5cAoT526uauwPVvvkNtgBHUlTyU"
"hansel_app_id" : "GOHUQ537FYR2N1DE1ZIEV8XXX"
"hansel_app_key" : "EPK75OTH5LSQX4S16PDPW997O5KZLT23AQS0XA8PDVKEDPJ816"
"hippo_secret_key" : "a54598d5f5aa6e8f3600857368ddedf7"
"password" : "Password"
"password_hidden" : "********"
"sessions" : "Sessions"
"study_mode_key" : "studyMode"
"username_bank" : "username@bank"
3bb16eeece5b95295c561794c061bbcd
63b52963e72e8b00186c11f3
460643a974555d792b8f5a6e1a5d323c
73463f9d-70de-41f8-857a-58590bdd5903
KjPXuAVfC5xbmgreETNMaL7z
90bd96d1c0b3dbe341cc5a33f373183a
FBA3AF4E7757D9016E953FB3EE4671CA2BD9AF725F9A53D52ED4A38EAAA08901
43c3ee578af49f1a2d38f88def6450a4
c343c249646188fd149da2c4172bd512
946eca6b182e63ebe50cf82e483715bf
6582a7c188c4a0f6997557e6
E3F9E1E0CF99D0E56A055BA65E241B3399F7CEA524326B0CDD6EC1327ED0FDC1
b5ecb7340656dd7652a58e3b1c3092bc
FFE391E0EA186D0734ED601E4E70E3224B7309D48E2075BAC46D8C667EAE7212
3241c65b0c63f983ada8ea79af5be48b
5c0c10dcbcca2ef16b20d4aa0c5d8ac8
63e671793965000019e13c19
5f257dc553ee62ca52a7c24ff2ed2b2c
Vn3kj4pUblROi2S+QfRRL9nhsaO2uoHQg6+dpEtxdTE=
3BAF59A2E5331C30675FAB35FF5FFF0D116142D3D4664F1C3CB804068B40614F

安全提示信息 应用程序记录日志信息,不得记录敏感信息

应用程序记录日志信息,不得记录敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs

Files:
com/appsflyer/internal/AFf1cSDK.java, line(s) 138
com/appsflyer/internal/AFf1fSDK.java, line(s) 121
com/appsflyer/internal/AFf1uSDK.java, line(s) 52,57,99,105
com/appsflyer/share/LinkGenerator.java, line(s) 204
com/mocklets/pluto/PlutoLog.java, line(s) 18,25,32,39,46
com/pairip/SignatureCheck.java, line(s) 33
com/pairip/VMRunner.java, line(s) 49,56,91,158,185,190,195
com/pairip/licensecheck/LicenseActivity.java, line(s) 93,71
com/pairip/licensecheck/LicenseClient.java, line(s) 77,90,121,138,168,196,187,112

安全提示信息 此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它

此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard

Files:
com/freshchat/consumer/sdk/activity/al.java, line(s) 4,31
com/gyanguru/ui/GyanGuruActivity.java, line(s) 4,633,634
in/juspay/hypersdk/core/JBridge.java, line(s) 7,408

已通过安全项 此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击

此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#testing-custom-certificate-stores-and-certificate-pinning-mstg-network-4

Files:
in/juspay/hypersdk/security/HyperSSLSocketFactory.java, line(s) 61,60,62,59,59

已通过安全项 此应用程序可能具有Root检测功能

此应用程序可能具有Root检测功能
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
in/juspay/hypersdk/data/SessionInfo.java, line(s) 117,121

综合安全基线评分总结

应用图标

MedEd v5.3.6

Android APK
51
综合安全评分
中风险