导航菜单

应用安全检测报告

应用安全检测报告,支持文件搜索、内容检索和AI代码分析

移动应用安全检测报告

应用图标

bbinstant v6.24.0

Android APK 9bf902f6...
45
安全评分

安全基线评分

45/100

中风险

综合风险等级

风险等级评定
  1. A
  2. B
  3. C
  4. F

应用存在一定安全风险,建议优化

漏洞与安全项分布

6 高危
26 中危
5 信息
2 安全

隐私风险评估

4
第三方跟踪器

中等隐私风险
检测到少量第三方跟踪器


检测结果分布

高危安全漏洞 6
中危安全漏洞 26
安全提示信息 5
已通过安全项 2
重点安全关注 0

高危安全漏洞 不安全的Web视图实现。Web视图忽略SSL证书错误并接受任何SSL证书。此应用程序易受MITM攻击

不安全的Web视图实现。Web视图忽略SSL证书错误并接受任何SSL证书。此应用程序易受MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#webview-server-certificate-verification

Files:
com/bigbasket/bbinstant/ui/help/DeleteAccountActivity.java, line(s) 40,71
com/bigbasket/bbinstant/ui/invoice/BannerClickWebView.java, line(s) 25,41

高危安全漏洞 启用了调试配置。生产版本不能是可调试的

启用了调试配置。生产版本不能是可调试的
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04c-Tampering-and-Reverse-Engineering.md#debugging-and-tracing

Files:
com/adjetter/kapchatsdk/BuildConfig.java, line(s) 3,8

高危安全漏洞 如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击

如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-7

Files:
in/juspay/hypersdk/core/DynamicUI.java, line(s) 175,376,10
in/juspay/hypersdk/safe/JuspayWebView.java, line(s) 60,9,10

高危安全漏洞 应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。

应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
f/b.java, line(s) 60,92

高危安全漏洞 该文件是World Writable。任何应用程序都可以写入文件

该文件是World Writable。任何应用程序都可以写入文件
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#testing-local-storage-for-sensitive-data-mstg-storage-1-and-mstg-storage-2

Files:
com/adjetter/kapchatsdk/KapchatOfflineMessage.java, line(s) 73,85,86,88,96
in/juspay/hypersdk/core/AndroidInterface.java, line(s) 676
in/juspay/hypersdk/data/KeyValueStore.java, line(s) 13

高危安全漏洞 应用程序在加密算法中使用ECB模式。ECB模式是已知的弱模式,因为它对相同的明文块[UNK]产生相同的密文

应用程序在加密算法中使用ECB模式。ECB模式是已知的弱模式,因为它对相同的明文块[UNK]产生相同的密文
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-block-cipher-mode

Files:
com/adjetter/kapchatsdk/KapchatHelper.java, line(s) 101,113
com/bigbasket/bbinstant/core/utils/f.java, line(s) 176,206

中危安全漏洞 Activity (com.bigbasket.bbinstant.ui.login.LoginActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.bigbasket.bbinstant.ui.BBInstantActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (in.juspay.hypersdk.core.CustomtabResult) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Service (com.moengage.firebase.MoEFireBaseMessagingService) 未受保护。

[android:exported=true]
检测到  Service 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Activity (com.amazon.identity.auth.device.workflow.WorkflowActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.amazon.android.apay.commonlibrary.browsinglib.activity.RedirectUriReceiverActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Service (androidx.work.impl.background.systemjob.SystemJobService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Activity (androidx.test.core.app.InstrumentationActivityInvoker$BootstrapActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (androidx.test.core.app.InstrumentationActivityInvoker$EmptyActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (androidx.test.core.app.InstrumentationActivityInvoker$EmptyFloatingActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (androidx.profileinstaller.ProfileInstallReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库

应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2

Files:
com/adjetter/kapchatsdk/database/KapchatDatabaseHelper.java, line(s) 7,8,9,198
com/adjetter/kapchatsdk/helper/KapchatReadOfflineMessage.java, line(s) 5,44
com/amazonaws/mobileconnectors/remoteconfiguration/internal/ConfigurationDb.java, line(s) 6,7,59,92,101,102,103,104,105,106
com/amazonaws/mobileconnectors/s3/transferutility/TransferTable.java, line(s) 3,52,53,54,55,56,60,64,68,72
com/moengage/core/internal/storage/database/a.java, line(s) 5,6,116
com/moengage/core/internal/storage/database/b.java, line(s) 6,114
com/moengage/core/internal/storage/database/w.java, line(s) 6,7,184,185,226,227,141,203
com/snowplowanalytics/snowplow/tracker/storage/b.java, line(s) 4,5,36,42
f/h.java, line(s) 4,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,38,39,40,41,42,43,46,49
f/i.java, line(s) 5,15,16,17

中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据

应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage

Files:
com/adjetter/kapchatsdk/KapchatListAdapter.java, line(s) 277,278,280,292,293,295,330,333,334,336,338
com/adjetter/kapchatsdk/KapchatReadMessages.java, line(s) 58,59
com/adjetter/kapchatsdk/activity/KapChatWebView.java, line(s) 91,183,298
com/adjetter/kapchatsdk/activity/KapchatAttachmentActivity.java, line(s) 218
com/adjetter/kapchatsdk/activity/KapchatScreenActivity.java, line(s) 460,896,905,952,1035,1750
com/adjetter/kapchatsdk/customattachments/KapchatAttachmentFolderViewActivity.java, line(s) 69
com/adjetter/kapchatsdk/helper/KapchatReadOfflineMessage.java, line(s) 70,71
com/adjetter/kapchatsdk/service/Kapchatdownloadservice.java, line(s) 113,172,180

中危安全漏洞 应用程序使用不安全的随机数生成器

应用程序使用不安全的随机数生成器
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-random-number-generators

Files:
com/adjetter/kapchatsdk/KapchatHelper.java, line(s) 44
com/adjetter/kapchatsdk/KapchatService.java, line(s) 26
com/adjetter/kapchatsdk/KapchatUploadService.java, line(s) 31
com/adjetter/kapchatsdk/activity/KapchatScreenActivity.java, line(s) 92
com/amazonaws/retry/PredefinedRetryPolicies.java, line(s) 9
com/simpl/android/fingerprint/a/a.java, line(s) 3
com/simpl/android/fingerprint/commons/exception/SimplAirbrakeNotifier.java, line(s) 20
de/measite/minidns/a.java, line(s) 16
de/measite/minidns/iterative/IterativeDNSClient.java, line(s) 24
de/measite/minidns/util/CollectionsUtil.java, line(s) 4
org/jivesoftware/smack/ReconnectionManager.java, line(s) 5
org/jivesoftware/smack/util/StringUtils.java, line(s) 7
org/jivesoftware/smackx/bytestreams/ibb/InBandBytestreamManager.java, line(s) 8
org/jivesoftware/smackx/bytestreams/socks5/Socks5BytestreamManager.java, line(s) 12
org/jivesoftware/smackx/filetransfer/FileTransferNegotiator.java, line(s) 10
org/junit/runner/manipulation/Ordering.java, line(s) 7

中危安全漏洞 SHA-1是已知存在哈希冲突的弱哈希

SHA-1是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/adjetter/kapchatsdk/KapchatHelper.java, line(s) 209
com/amazon/android/apay/commonlibrary/instrumentationlib/encryptor/a.java, line(s) 74
com/moengage/core/internal/utils/MoEUtils.java, line(s) 150
de/measite/minidns/a.java, line(s) 59
org/jivesoftware/smack/util/MAC.java, line(s) 14
org/jivesoftware/smack/util/SHA1.java, line(s) 11
org/jivesoftware/smackx/caps/EntityCapsManager.java, line(s) 120
org/jivesoftware/smackx/vcardtemp/packet/VCard.java, line(s) 206

中危安全漏洞 不安全的Web视图实现。可能存在WebView任意代码执行漏洞

不安全的Web视图实现。可能存在WebView任意代码执行漏洞
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#testing-javascript-execution-in-webviews-mstg-platform-5

Files:
com/bigbasket/bbinstant/core/payments/activity/SimplWebViewActivity.java, line(s) 141,123
com/bigbasket/bbinstant/ui/offers/FragmentOffers.java, line(s) 66,63
com/paytm/pgsdk/PaytmWebView.java, line(s) 196,194
com/simpl/android/zeroClickSdk/internal/SimplZeroClickWebViewFragment.java, line(s) 609,606
in/juspay/hypersdk/core/DynamicUI.java, line(s) 106,129,205,104
in/juspay/hypersdk/safe/Godel.java, line(s) 332,582,576

中危安全漏洞 可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息

可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-6

Files:
com/adjetter/kapchatsdk/activity/KapChatWebView.java, line(s) 231,228
in/juspay/hypersdk/safe/Godel.java, line(s) 589,576

中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等

文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10

Files:
ch/qos/logback/classic/ClassicConstants.java, line(s) 17,20,22
ch/qos/logback/classic/gaffer/c.java, line(s) 38
ch/qos/logback/classic/joran/action/ConfigurationAction.java, line(s) 21
ch/qos/logback/classic/sift/ContextBasedDiscriminator.java, line(s) 7
ch/qos/logback/classic/sift/JNDIBasedContextDiscriminator.java, line(s) 9
ch/qos/logback/core/CoreConstants.java, line(s) 12,31,65,21
ch/qos/logback/core/rolling/helper/DateTokenConverter.java, line(s) 10
ch/qos/logback/core/rolling/helper/IntegerTokenConverter.java, line(s) 7
com/adjetter/kapchatsdk/KapchatHelper.java, line(s) 72,313
com/amazonaws/auth/CognitoCachingCredentialsProvider.java, line(s) 17,18,19,20,21
com/amazonaws/auth/policy/conditions/ConditionFactory.java, line(s) 8,9,10,11,12,13,14
com/amazonaws/auth/policy/conditions/S3ConditionFactory.java, line(s) 10,11,12,14,15,8,9,13
com/amazonaws/mobileconnectors/remoteconfiguration/internal/AttributesImpl.java, line(s) 94
com/amazonaws/mobileconnectors/s3/transferutility/TransferTable.java, line(s) 30,36
com/amazonaws/services/s3/Headers.java, line(s) 23,28,65
com/amazonaws/services/s3/model/S3ObjectSummary.java, line(s) 72
com/bigbasket/bbinstant/AppMigrator.java, line(s) 23
com/bigbasket/bbinstant/BuildConfig.java, line(s) 9
com/bigbasket/bbinstant/core/Constants.java, line(s) 10
com/bigbasket/bbinstant/core/io/wifi/n.java, line(s) 146,155
com/bigbasket/bbinstant/core/persistance/a.java, line(s) 4
com/bigbasket/bbinstant/ui/login/v.java, line(s) 291
com/moengage/core/config/h.java, line(s) 49
com/moengage/core/config/k.java, line(s) 49
com/moengage/core/internal/rest/d.java, line(s) 145
com/moengage/core/internal/storage/database/contract/h.java, line(s) 11
org/jivesoftware/smackx/muc/MucConfigFormManager.java, line(s) 19

中危安全漏洞 MD5是已知存在哈希冲突的弱哈希

MD5是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/amazonaws/services/s3/AmazonS3Client.java, line(s) 2170
com/amazonaws/services/s3/internal/MD5DigestCalculatingInputStream.java, line(s) 28
com/amazonaws/util/Md5Utils.java, line(s) 20,63
com/moengage/core/internal/utils/d.java, line(s) 475
f/b.java, line(s) 107,115
in/juspay/hypersdk/security/EncryptionHelper.java, line(s) 123,201
org/jivesoftware/smack/util/MD5.java, line(s) 11

中危安全漏洞 IP地址泄露

IP地址泄露


Files:
com/bigbasket/bbinstant/core/machine/impl/transactor/h.java, line(s) 12,38
com/bigbasket/bbinstant/core/utils/NetworkUtils.java, line(s) 18,51
de/measite/minidns/DNSClient.java, line(s) 73
org/jivesoftware/smackx/bytestreams/socks5/Socks5BytestreamManager.java, line(s) 162

中危安全漏洞 应用程序创建临时文件。敏感信息永远不应该被写进临时文件

应用程序创建临时文件。敏感信息永远不应该被写进临时文件


Files:
com/journeyapps/barcodescanner/j.java, line(s) 120
org/junit/rules/TemporaryFolder.java, line(s) 70,196

中危安全漏洞 Firebase远程配置已启用

Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/107639205075/namespaces/firebase:fetch?key=AIzaSyB37oVE4etgDV38pu_GU2DIqzXDUy_rJzg ) 已启用。请确保这些配置不包含敏感信息。响应内容如下所示:

{
    "entries": {
        "bbinstant_cer": "-----BEGIN CERTIFICATE-----\nMIIECjCCAvKgAwIBAgIJAKXZGBQMk4cgMA0GCSqGSIb3DQEBCwUAMIGZMQswCQYD\nVQQGEwJJTjESMBAGA1UECAwJS2FybmF0YWthMRIwEAYDVQQHDAlCYW5nYWxvcmUx\nEjAQBgNVBAoMCUJpZ2Jhc2tldDESMBAGA1UECwwJQkJJbnN0YW50MRIwEAYDVQQD\nDAliYmluc3RhbnQxJjAkBgkqhkiG9w0BCQEWF2JiaW5zdGFudEBiaWdiYXNrZXQu\nY29tMB4XDTIzMDgxODA5NTQwMFoXDTI0MDgxNzA5NTQwMFowgZkxCzAJBgNVBAYT\nAklOMRIwEAYDVQQIDAlLYXJuYXRha2ExEjAQBgNVBAcMCUJhbmdhbG9yZTESMBAG\nA1UECgwJQmlnYmFza2V0MRIwEAYDVQQLDAlCQkluc3RhbnQxEjAQBgNVBAMMCWJi\naW5zdGFudDEmMCQGCSqGSIb3DQEJARYXYmJpbnN0YW50QGJpZ2Jhc2tldC5jb20w\nggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDrLyiWAIAMLnDMe/vh1kpo\nNm/WAblEWC+vigUkM+OKXGoA23gWYxGBvy+pFcV+rGUQ7eXBkPElREPh7/Aab1Os\nIvDg449Ie5vL1cTssSv2Fn1AZX7nHBvDxv+P2R+vYPZODYdJiHDRugeU5MEjQs/W\n1h6r0KdRR4TBc7Y7IzErdZlS36Zeb/lz26jHVxCiq4uMh0v3oOA9jd3ww9opKVhE\nX4R14IejIURTPlThKJfkyoHsCNoHq4eYHsTYrlQ03kxDtM3gv1ocyZvLWEq7Llk0\nsPiUvj7slMJRRklWPlzNT2iSay+jpBcYpJ3eiKbtzUtZW1eUTOz476DaLHoECVvd\nAgMBAAGjUzBRMB0GA1UdDgQWBBQzdjnQ8Tz7mnH6JOQ35BCJSxi7+zAfBgNVHSME\nGDAWgBQzdjnQ8Tz7mnH6JOQ35BCJSxi7+zAPBgNVHRMBAf8EBTADAQH/MA0GCSqG\nSIb3DQEBCwUAA4IBAQBdUz7eHh0iXdvb9KyZ3s0/k3Rgm+FldfX9gf2iq/I1I1h+\nGrPz2Ti1shRE5Z9hecF8psz/tkFUtDYfNO4K194QiECTUJ7w1BY4ADKa8dJzQADk\n0IheAAZlnKPvmxwSA27Jnod9QDt03vrdDVmpdi/WgfnTBANeyDmXkkv4mfb1kr8g\ny93kuqmKucXhQDNkmGl08GhSlWE5c/4LsZwkwMmomGBRq6+S+3+iuih2E2djT50l\n8lnWyO+t6KkRSWTy3T/megZf8+cNgrn9SiyQzePwX3QnZrLgMABJnu6cV7/A62hJ\nHj4tsyy6bxs/Ofw8pMHjltMqao9RMoGBFFR5F74D\n-----END CERTIFICATE-----\n",
        "bbinstant_private_key": "-----BEGIN PRIVATE KEY-----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\nsMYi0N9Gs1+nnB4ocVG0MSg=\n-----END PRIVATE KEY-----\n",
        "root_detetction_key": "22097eed8863e4cdaaa881263ce048a4"
    },
    "state": "UPDATE",
    "templateVersion": "7"
}

中危安全漏洞 应用程序包含隐私跟踪程序

此应用程序有多个4隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。

中危安全漏洞 此应用可能包含硬编码机密信息

从应用程序中识别出以下机密确保这些不是机密或私人信息
"com.google.firebase.crashlytics.mapping_file_id" : "f797b19961954cef8c3316b7e8d9b8dc"
"firebase_database_url" : "https://bbinstant-3d40b.firebaseio.com"
"google_api_key" : "AIzaSyB37oVE4etgDV38pu_GU2DIqzXDUy_rJzg"
"google_app_id" : "1:107639205075:android:03390ffdb271f25ff6f826"
"google_crash_reporting_api_key" : "AIzaSyB37oVE4etgDV38pu_GU2DIqzXDUy_rJzg"
"kapchat_encription_key" : "Dlj16uso0U9OfX5S"
"kapchat_support_key" : "95bbfa381c541117d41252aad76b9b8f799b94025197660011"
"library_zxingandroidembedded_author" : "JourneyApps"
"library_zxingandroidembedded_authorWebsite" : "https://journeyapps.com/"
"long_live_token" : "YXU2ZjBmMGhtb2czbWJnMWlxdHVlemxrOGxtMnc2OHA6TkE6MTUyMjY2NTAyNzc5MjozNjcwMTQ4Njc0NzkyOmRlZmF1bHQ6QkI6OlF2REg1QS8xVm5UUjRveEcwWEZhN2JveWpTeXdmR1FUUUIxODNuVkp6eFBjYjlzQVdRTDNreDlCdDVPd2VOeDc5YWRacG5hL1UyWXhlZjh2TG1Cc3VtQUE0dm1yR2NsOFFJS1FDa1hPMzVQUlp3cDJCNXcxSCs1UE5zL29DczBZelpxZzBSd3FDNFVDOHJyellUK0g3ZHh1TzkwV2czVXljbkJlSytGaFZpQT0="
36C9F7E3EB6A269BDDFF5A64CC66B5BE3A60F5574F98E01B3A545DB50FC93FAB
57660439B9DC6FABAECC0D3CC97D6115
3617DE4A96262C6F5D9E98BF9292DC29F8F41DBD289A147CE9DA3113B5F0B8C00A60B1CE1D7E819D7A431D7C90EA0E5F
a0ef473d453f05ad6ff71676e33d7d4a
C2517D5D73DCAD84D9095606B6E17303
66342e6a-221b-4be7-acdf-953a00dabf02
YXU2ZjBmMGhtb2czbWJnMWlxdHVlemxrOGxtMnc2OHA6TkE6MTUyMjY2NTAyNzc5MjozNjcwMTQ4Njc0NzkyOmRlZmF1bHQ6QkI6OlF2REg1QS8xVm5UUjRveEcwWEZhN2JveWpTeXdmR1FUUUIxODNuVkp6eFBjYjlzQVdRTDNreDlCdDVPd2VOeDc5YWRacG5hL1UyWXhlZjh2TG1Cc3VtQUE0dm1yR2NsOFFJS1FDa1hPMzVQUlp3cDJCNXcxSCs1UE5zL29DczBZelpxZzBSd3FDNFVDOHJyellUK0g3ZHh1TzkwV2czVXljbkJlSytGaFZpQT0=
4FE342E2FE1A7F9B8EE7EB4A7C0F9E162BCE33576B315ECECBB6406837BF51F5
636AB46B2AF570F9FD30ADD59BC2FB6FEAECFA89C3E49CCC3112ED3165BAAB34
8D91E471E0989CDA27DF505A453F2B7635294F2DDF23E3B122ACC99C9E9F1E14
44F78EC25D25FF975E8F7FB250CBCE2D
raOEEmS6NNJF+0NTK2DPnxl7nmS0lzdtzWPgKibq3+M=
FDF0F181D42606A8898272AA4123FB832B1B552E7BA2CC82597C5120E02F259DB4C6785517813C182666216FB0876FD1
2f19adeb284eb36f7f07786152b9a1d14b21653203ad0b04ebbf9c73ab6d7625
f6feefbb-ec15-40fc-a95d-920d767d36f0
B3312FA7E23EE7E4988E056BE3F82D19181D9C6EFE8141120314088F5013875AC656398D8A2ED19D2A85C8EDD3EC2AEF
34e6eb07889d4740999b1097d5fa8907
6B17D1F2E12C4247F8BCE6E563A440F277037D812DEB33A0F4A13945D898C296
013D19574167A4BAA905907B56AB23A5
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
FFFFFFFF00000000FFFFFFFFFFFFFFFFBCE6FAADA7179E84F3B9CAC2FC632551
AA87CA22BE8B05378EB1C71EF320AD746E1D3B628BA79B9859F741E082542A385502F25DBF55296C3A545E3872760AB7
6B587B24A16D35ECAF938D3E6983EA5FA8A694B7A67F1178D87173FE4956E6B7B3182746986CA911AB1B0B8AB2E4DCF5755A0C50C0A99AABDAC5A1F00BF683E744F1990CD7BE3497F8FF9672841737F6F9600C1731AA254E8A524A3E80543E5B5B7CBA995D03E021CE95F179055C06C578DE91136F5555D682432E7E2C302E539BE507972B4719AA91D4F1D08F8BD9A4
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
145ED281FC8E72F118F221C3AAEA73EDD88BA2A6FB994DA3ADE8DD3F0AB953760A3F888D3A76ABDA8692AA44361CB954
mXoPQltfyvuB7EhEtNgjqo0MpjU3aq92WWMIBy2y
4A32E19B09F8B5D951F6B70DBF31A5BE
2D086BA22FDD20075032499B803991B8
9A045ADDE66EBDC57A9C94D973C45BCA
5AC635D8AA3A93E7B3EBBD55769886BC651D06B0CC53B0F63BCE3C3E27D2604B
5a19174c-d4dc-436e-867c-866e396b4904
fb68fde12f8d24307fa351f463d75d12
E2679CD1FB9DD4277518CD606ABA879B

安全提示信息 应用程序记录日志信息,不得记录敏感信息

应用程序记录日志信息,不得记录敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs

Files:
ch/qos/logback/classic/pattern/b.java, line(s) 26,29,31,34
ch/qos/logback/classic/spi/PackagingDataCalculator.java, line(s) 20
ch/qos/logback/classic/spi/j.java, line(s) 79
ch/qos/logback/core/joran/util/a.java, line(s) 29
ch/qos/logback/core/net/d.java, line(s) 23
ch/qos/logback/core/recovery/ResilientOutputStreamBase.java, line(s) 43
ch/qos/logback/core/spi/ContextAwareBase.java, line(s) 37
ch/qos/logback/core/spi/d.java, line(s) 37
com/adjetter/kapchatsdk/KapchatListAdapter.java, line(s) 279,282,286,289,294,297,303
com/adjetter/kapchatsdk/KapchatOfflineMessage.java, line(s) 78
com/adjetter/kapchatsdk/KapchatService.java, line(s) 104
com/adjetter/kapchatsdk/KapchatUpdateMessageStatus.java, line(s) 41
com/adjetter/kapchatsdk/KapchatUploadService.java, line(s) 131
com/adjetter/kapchatsdk/NetworkconnectionChecker.java, line(s) 44
com/adjetter/kapchatsdk/activity/KapchatRegistrationActivity.java, line(s) 95
com/adjetter/kapchatsdk/activity/KapchatScreenActivity.java, line(s) 624,1081
com/amazon/android/apay/commonlibrary/commonlib/arcus/AppConfigWorker.java, line(s) 33
com/amazonaws/logging/AndroidLog.java, line(s) 27,32,37,42,47
com/amazonaws/mobileconnectors/remoteconfiguration/internal/AttributesImpl.java, line(s) 220
com/bigbasket/bbinstant/core/io/socket/command/parsers/Test.java, line(s) 10,12
com/bigbasket/bbinstant/ui/discoverability/i0.java, line(s) 109,151
com/paytm/pgsdk/PaytmPGService.java, line(s) 82,87
com/paytm/pgsdk/PaytmUtility.java, line(s) 18
junit/runner/BaseTestRunner.java, line(s) 221
junit/runner/a.java, line(s) 12
junit/textui/TestRunner.java, line(s) 27,60,91
org/jivesoftware/smack/debugger/ConsoleDebugger.java, line(s) 25

安全提示信息 应用程序可以写入应用程序目录。敏感信息应加密

应用程序可以写入应用程序目录。敏感信息应加密


Files:
com/amazon/android/apay/commonlibrary/commonlib/utils/c.java, line(s) 34,81,34,81
com/moengage/core/internal/storage/e.java, line(s) 257,280,257,280

安全提示信息 此应用侦听剪贴板更改。一些恶意软件也会监听剪贴板更改

此应用侦听剪贴板更改。一些恶意软件也会监听剪贴板更改
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard

Files:
in/juspay/hypersdk/core/ClipboardListener.java, line(s) 14,5

安全提示信息 此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它

此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard

Files:
com/moengage/core/internal/utils/d.java, line(s) 7,397,399

安全提示信息 应用与Firebase数据库通信

该应用与位于 https://bbinstant-3d40b.firebaseio.com 的 Firebase 数据库进行通信

已通过安全项 此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击

此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#testing-custom-certificate-stores-and-certificate-pinning-mstg-network-4

Files:
ch/qos/logback/core/net/ssl/SSLContextFactoryBean.java, line(s) 36,54,81,53,53,54,55
com/adjetter/kapchatsdk/helper/ApiClient.java, line(s) 26,26
com/bigbasket/bbinstant/core/cloud/Cloud.java, line(s) 131,134,128,77,156,162,166,170
com/snowplowanalytics/snowplow/tracker/emitter/h.java, line(s) 28,27,26,26
de/measite/minidns/dane/b.java, line(s) 24,23,22,22
in/juspay/hypersdk/security/HyperSSLSocketFactory.java, line(s) 66,65,67,64,64
org/jivesoftware/smack/util/TLSUtils.java, line(s) 54,60

已通过安全项 此应用程序可能具有Root检测功能

此应用程序可能具有Root检测功能
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
in/juspay/hypersdk/data/SessionInfo.java, line(s) 108,112

综合安全基线评分总结

应用图标

bbinstant v6.24.0

Android APK
45
综合安全评分
中风险