导航菜单

应用安全检测报告

应用安全检测报告,支持文件搜索、内容检索和AI代码分析

移动应用安全检测报告

应用图标

新暖心缘 v8.1.1

Android APK dc0be2c4...
43
安全评分

安全基线评分

43/100

中风险

综合风险等级

风险等级评定
  1. A
  2. B
  3. C
  4. F

应用存在一定安全风险,建议优化

漏洞与安全项分布

7 高危
25 中危
2 信息
2 安全

隐私风险评估

4
第三方跟踪器

中等隐私风险
检测到少量第三方跟踪器


检测结果分布

高危安全漏洞 7
中危安全漏洞 25
安全提示信息 2
已通过安全项 2
重点安全关注 0

高危安全漏洞 Activity (cn.jpush.android.service.JNotifyActivity) 易受 StrandHogg 2.0 攻击

检测到 Activity 存在 StrandHogg 2.0 任务劫持漏洞。攻击者可将恶意 Activity 置于易受攻击应用的任务栈顶部,使应用极易成为钓鱼攻击目标。可通过将启动模式设置为 "singleInstance" 并将 taskAffinity 设为空(taskAffinity=""),或将应用的 target SDK 版本(28)升级至 29 及以上,从平台层面修复该漏洞。

高危安全漏洞 Activity (com.luanxingyuan.app.wxapi.WXEntryActivity) 易受 StrandHogg 2.0 攻击

检测到 Activity 存在 StrandHogg 2.0 任务劫持漏洞。攻击者可将恶意 Activity 置于易受攻击应用的任务栈顶部,使应用极易成为钓鱼攻击目标。可通过将启动模式设置为 "singleInstance" 并将 taskAffinity 设为空(taskAffinity=""),或将应用的 target SDK 版本(28)升级至 29 及以上,从平台层面修复该漏洞。

高危安全漏洞 Activity (com.luanxingyuan.app.wxapi.WXPayEntryActivity) 易受 StrandHogg 2.0 攻击

检测到 Activity 存在 StrandHogg 2.0 任务劫持漏洞。攻击者可将恶意 Activity 置于易受攻击应用的任务栈顶部,使应用极易成为钓鱼攻击目标。可通过将启动模式设置为 "singleInstance" 并将 taskAffinity 设为空(taskAffinity=""),或将应用的 target SDK 版本(28)升级至 29 及以上,从平台层面修复该漏洞。

高危安全漏洞 不安全的Web视图实现。Web视图忽略SSL证书错误并接受任何SSL证书。此应用程序易受MITM攻击

不安全的Web视图实现。Web视图忽略SSL证书错误并接受任何SSL证书。此应用程序易受MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#webview-server-certificate-verification

Files:
com/luanxingyuan/app/activity/WebActivity.java, line(s) 90,89

高危安全漏洞 使用弱加密算法

使用弱加密算法
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
m1/b.java, line(s) 10

高危安全漏洞 应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。

应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/luanxingyuan/app/manager/ConfigManager.java, line(s) 116
d2/n.java, line(s) 190,241
i6/h3.java, line(s) 86,190
i6/z1.java, line(s) 65,101,161,174
w1/c.java, line(s) 31,70,88,105

高危安全漏洞 该文件是World Writable。任何应用程序都可以写入文件

该文件是World Writable。任何应用程序都可以写入文件
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#testing-local-storage-for-sensitive-data-mstg-storage-1-and-mstg-storage-2

Files:
com/faceunity/wrappe/repo/FaceBeautySource.java, line(s) 220

中危安全漏洞 应用已启用明文网络流量

[android:usesCleartextTraffic=true]
应用允许明文网络流量(如 HTTP、FTP 协议、DownloadManager、MediaPlayer 等)。API 级别 27 及以下默认启用,28 及以上默认禁用。明文流量缺乏机密性、完整性和真实性保护,攻击者可窃听或篡改传输数据。建议关闭明文流量,仅使用加密协议。

中危安全漏洞 应用数据允许备份

[android:allowBackup=true]
该标志允许通过 adb 工具备份应用数据。启用 USB 调试的用户可直接复制应用数据,存在数据泄露风险。

中危安全漏洞 Service (com.luanxingyuan.app.socket.WakeupService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Activity (com.tencent.tauth.AuthActivity) 未受保护。

存在 intent-filter。
检测到  Activity 已与设备上的其他应用共享,因此可被任意应用访问。intent-filter 的存在表明该 Activity 被显式导出,存在安全风险。

中危安全漏洞 Service (com.luanxingyuan.app.jpush.JpushService) 未受保护。

存在 intent-filter。
检测到  Service 已与设备上的其他应用共享,因此可被任意应用访问。intent-filter 的存在表明该 Service 被显式导出,存在安全风险。

中危安全漏洞 Content Provider (cn.jpush.android.service.DownloadProvider) 未受保护。

[android:exported=true]
检测到  Content Provider 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity 设置了 TaskAffinity 属性

(cn.jpush.android.service.JNotifyActivity)
设置 taskAffinity 后,其他应用可读取发送至该 Activity 的 Intent。为防止敏感信息泄露,建议保持默认 affinity(包名)。

中危安全漏洞 Activity (cn.jpush.android.service.JNotifyActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.luanxingyuan.app.wxapi.WXEntryActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.luanxingyuan.app.wxapi.WXPayEntryActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Service (cn.jpush.android.service.DaemonService) 未受保护。

[android:exported=true]
检测到  Service 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 高优先级 Intent(1000) - {2} 个命中

[android:priority]
通过设置较高的 Intent 优先级,应用可覆盖其他请求,可能导致安全风险。

中危安全漏洞 MD5是已知存在哈希冲突的弱哈希

MD5是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/luanxingyuan/app/util/SignUtil.java, line(s) 34
com/luanxingyuan/app/util/SystemUtil.java, line(s) 43
com/qiniu/util/Md5.java, line(s) 35,49
com/qiniu/util/StringUtils.java, line(s) 45
d2/p.java, line(s) 21,113
d7/c.java, line(s) 52
i6/j3.java, line(s) 21,109
w6/g.java, line(s) 112

中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等

文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10

Files:
com/luanxingyuan/app/activity/YoungModePasswordActivity.java, line(s) 20
com/luanxingyuan/app/util/SignUtil.java, line(s) 7
com/pay/paytypelibrary/OrderInfo.java, line(s) 233
com/pay/paytypelibrary/PayUtil.java, line(s) 114
com/pili/pldroid/player/AVOptions.java, line(s) 12,15
com/unionpay/tsmservice/data/Constant.java, line(s) 195,197
com/unionpay/tsmservice/data/ResultCode.java, line(s) 75,62
com/unionpay/tsmservice/mi/data/Constant.java, line(s) 142,146
com/unionpay/tsmservice/mi/data/ResultCode.java, line(s) 33,30
u2/h.java, line(s) 79
w2/d.java, line(s) 31
w2/p.java, line(s) 95
w2/x.java, line(s) 68
y7/c.java, line(s) 25

中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库

应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2

Files:
d2/n0.java, line(s) 3,14,15,16,17,18
d2/w0.java, line(s) 3,31
i6/a2.java, line(s) 4,129,144
i6/d0.java, line(s) 3,31
i6/d2.java, line(s) 3,14
i6/t.java, line(s) 3,14,15,16,17,18
i6/t2.java, line(s) 12,552
io/agora/utils/SqliteWrapper.java, line(s) 3,4,61,107,155,156
s1/a.java, line(s) 5,6,30,75

中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据

应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage

Files:
com/cjt2325/cameralibrary/a.java, line(s) 671
com/faceunity/core/utils/FileUtils.java, line(s) 120
com/luanxingyuan/app/activity/CameraActivity.java, line(s) 100
com/luanxingyuan/app/activity/PostActiveActivity.java, line(s) 882
com/luanxingyuan/app/activity/WebActivity.java, line(s) 161
com/luanxingyuan/app/util/FileUtil.java, line(s) 23,126
com/luanxingyuan/app/util/MyDataCleanManager.java, line(s) 11,63
com/tencent/a/a/a/a/b.java, line(s) 20,22,33,41
com/unionpay/utils/j.java, line(s) 30
com/yalantis/ucrop/util/FileUtils.java, line(s) 70
d2/m.java, line(s) 203,204
i6/g3.java, line(s) 209,210
i6/p.java, line(s) 40
i6/t2.java, line(s) 444,448
io/agora/rtc2/internal/CommonUtility.java, line(s) 408,408
u3/e.java, line(s) 8
w/b.java, line(s) 8
x1/b.java, line(s) 505,719,720
y1/c.java, line(s) 12,24,28

中危安全漏洞 应用程序使用不安全的随机数生成器

应用程序使用不安全的随机数生成器
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-random-number-generators

Files:
com/luanxingyuan/app/activity/ApplyVerifyHandActivity.java, line(s) 41
com/luanxingyuan/app/fragment/PersonInfoFragment.java, line(s) 47
com/luanxingyuan/app/fragment/PersonInfoOneFragment.java, line(s) 41
com/luanxingyuan/app/fragment/info/InfoFragment.java, line(s) 20
com/luanxingyuan/app/util/permission/CheckPermissionActivity.java, line(s) 14
com/pili/pldroid/player/common/Util.java, line(s) 24
com/qiniu/storage/UpHostHelper.java, line(s) 11
com/tencent/av/TIMAvManager.java, line(s) 25
d2/v1.java, line(s) 7
i6/t2.java, line(s) 33
i6/z0.java, line(s) 9
i8/b.java, line(s) 8
i8/g.java, line(s) 5
i8/v.java, line(s) 8
io/agora/rtc2/internal/AudioFocusManager.java, line(s) 12
io/agora/rtc2/internal/SimpleMediaPlayerSource.java, line(s) 27
io/agora/rtc2/internal/SurfaceEglRendererHelper.java, line(s) 26
k6/x.java, line(s) 17
l1/c.java, line(s) 9
l9/o.java, line(s) 4
t1/k.java, line(s) 33
w0/b.java, line(s) 10
w7/a.java, line(s) 7
w7/c.java, line(s) 7

中危安全漏洞 SHA-1是已知存在哈希冲突的弱哈希

SHA-1是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/faceunity/wrappe/authpack.java, line(s) 12
com/faceunity/wrappe/authpack_old.java, line(s) 12
com/qiniu/storage/persistent/FileRecorder.java, line(s) 19
com/qiniu/util/Auth.java, line(s) 100
com/qiniu/util/Etag.java, line(s) 52,75
com/unionpay/utils/UPUtils.java, line(s) 16
com/unionpay/utils/b.java, line(s) 116
d2/j.java, line(s) 124
i6/c3.java, line(s) 196
s6/a.java, line(s) 38
v1/a.java, line(s) 82
w1/b.java, line(s) 11
w1/c.java, line(s) 30,87

中危安全漏洞 不安全的Web视图实现。可能存在WebView任意代码执行漏洞

不安全的Web视图实现。可能存在WebView任意代码执行漏洞
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#testing-javascript-execution-in-webviews-mstg-platform-5

Files:
com/luanxingyuan/app/activity/CommonWebViewActivity.java, line(s) 182,170
com/luanxingyuan/app/activity/KeFuWebViewActivity.java, line(s) 92,96
com/luanxingyuan/app/activity/PayInnerWebViewActivity.java, line(s) 163,167
com/luanxingyuan/app/fragment/WebFragment.java, line(s) 95,109
com/unionpay/WebViewJavascriptBridge.java, line(s) 32,29
i6/y2.java, line(s) 115,114

中危安全漏洞 应用程序创建临时文件。敏感信息永远不应该被写进临时文件

应用程序创建临时文件。敏感信息永远不应该被写进临时文件


Files:
m0/b.java, line(s) 135

中危安全漏洞 IP地址泄露

IP地址泄露


Files:
com/luanxingyuan/app/ttt/QiNiuChecker.java, line(s) 223
com/luanxingyuan/app/util/ComprehensiveSecurityDetector.java, line(s) 95,101
com/luanxingyuan/app/util/IpUtils.java, line(s) 44,86,149
com/qiniu/qplayer/mediaEngine/MediaPlayer.java, line(s) 1436
t1/k.java, line(s) 40,40
w6/h.java, line(s) 113,146,178
w6/i.java, line(s) 122

中危安全漏洞 可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息

可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-6

Files:
com/luanxingyuan/app/activity/CommonWebViewActivity.java, line(s) 179,170
com/luanxingyuan/app/fragment/WebFragment.java, line(s) 99,109
com/pay/paytypelibrary/activity/WebViewActivity.java, line(s) 142,141

中危安全漏洞 此应用程序可能会请求root(超级用户)权限

此应用程序可能会请求root(超级用户)权限
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
com/luanxingyuan/app/util/ComprehensiveSecurityDetector.java, line(s) 20

中危安全漏洞 应用程序包含隐私跟踪程序

此应用程序有多个4隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。

中危安全漏洞 此应用可能包含硬编码机密信息

从应用程序中识别出以下机密确保这些不是机密或私人信息
高德地图的=> "com.amap.api.v2.apikey" : "879a97ceb585d9435ea7fa6b1eb8d055"
极光推送的=> "JPUSH_CHANNEL" : "1d44a9b45315bf8b18406631"
openinstall统计的=> "com.openinstall.APP_KEY" : "ffjqs7"
极光推送的=> "JPUSH_APPKEY" : "13900277c357d3568d9f53fc"
b2e8bd171989cb2c3c13bd89b4c1067a
668319f11506def6208d6afe320dfd52
9a571aa113ad987d626c0457828962e6
EYW5kcm9pZC5wZXJtaXNzaW9uLldSSVRFX1NFQ1VSRV9TRVRUSU5HUw==
53E53D46011A6BBAEA4FAE5442E659E0577CDD336F930C28635C322FB3F51C3C63F7FBAC9EAE448DFA2E5E5D716C4807
a1f5886b7153004c5c99559f5261676f
IaHR0cDovL2xvZ3MuYW1hcC5jb20vd3MvbG9nL3VwbG9hZD9wcm9kdWN0PSVzJnR5cGU9JXMmcGxhdGZvcm09JXMmY2hhbm5lbD0lcyZzaWduPSVz
0000000023456789abcdef12123456786789abcd
F13160D440C7D0229DA95450F66AF92154AC84DF088F8CA3100B2E8131D57F3DC67124D4C466056E7A3DFBE035E1B9A4B9DA4DB68AE65A43EDFD92F5C60EF0C9
WYW5kcm9pZC5wZXJtaXNzaW9uLlJFQURfUEhPTkVfU1RBVEU=
92a864886f70d010101050003818d0030818902818100c42e6236d5054ffccaa
FB923EE67A8B4032DAA517DD8CD7A26FF7C25B0C3663F92A0B61251C4FFFA858DF169D61321C3E7919CB67DF8EFEC827
08eb9b5c67474d027fa03ce35109b11604083ab6bb4df2c46240f879f
fe643c382e5c3b3962141f1a2e815a78
d9255940da7b6cd07483f4b4243fd1825b2705
b1ff56cef0e21c87260c63ce3ca868bf5974c14
0f060355040713085368616e676861693117
Las1ioyJvaLihw3cY6Ywn2rrxRtur7NXiMrioFxy
64c2f89fdffa16729c9779f99562bc189d2ce4722ba0faedb11aa22d0d9db228fda
aa8130e0-66fc-11e0-bad0-0002a5d5c51b
bb392ec0-8d4d-11e0-a896-0002a5d5c51b
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
b1fdf62b0f540fca5458b063af9354925a6c3505a18ff164b6b195f6e517eaee1fb783
1NWVc5eQD0SwXAjio3GWhLT4v7
239CE372F804D4BE4EAFFD183668379BDF274440E6F246AB16BBE6F5D1D30DEACFBBF0C942485727FF12288228760A9E
6X8Y4XdM2Vhvn0KfzcEatGnWaNU=
c06c8400-8e06-11e0-9cb6-0002a5d5c51b
f6e5061793111300f06035504031308556e696f6e50617930819f300d060
D75BB2802E61738A9A03BF014F927D9A
8cc1d6ed5e1b2cc00489215aec3fc2eac008e767b0215981cb5e
EYW5kcm9pZC5wZXJtaXNzaW9uLkFDQ0VTU19DT0FSU0VfTE9DQVRJT04=
WY29tLmFtYXAuYXBpLmFpdW5ldC5OZXRSZXVlc3RQYXJhbQ
1001a3e74c601e3beb1b7ae4f9ab2872a0aaf1dbc2cba89c7528cd
a9a9d23668a1a7ea93de9b21d67e436a
15060355040a130e4368696e6120556e696f6e50617931173015060355040b130e4
3634385a3078310b300906035504061302383631
47fc765bed664890a46ce00762927c26
AYW5kcm9pZC5wZXJtaXNzaW9uLkFDQ0VTU19ORVRXT1JLX1NUQVRF
536C79B93ACFBEA950AE365D8CE1AEF91FEA9535
54aa526e7a37d8ba2311a1d3d2ab79b3fbeaf3ebb9e7da9e7cdd9be1ae5a53595f47
b6cbad6cbd5ed0d209afc69ad3b7a617efaae9b3c47eabe0be42d924936fa78c8001b1fd74b079e5ff9690061dacfa4768e981a526b9ca77156ca36251cf2f906d105481374998a7e6e6e18f75ca98b8ed2eaf86ff402c874cca0a263053f22237858206867d210020daa38c48b20cc9dfd82b44a51aeb5db459b22794e2d649
11300f060355040813085368616e67686169311130
6e696f6e5061793111300f06035504031308556e696f6e5061
f6e50617931173015060355040b130e4368696e6120556e696
D2FF99A88BEB04683D89470D4FA72B1749DA456AB0D0F1A476477CE5A6874F53A9106423D905F9D808C0FCE8E7F1E04AC642F01FE41D0C7D933971F45CBA72B7
AKIDVtY2LTN3UpwqWzFH5i8B0ax61iBQR4Xn
AF2228680EDC323FBA035362EB7E1E38A0C33E1CF6F6FB805EE553A230CBA754CD9552EB9B546542CBE619E8293151BE
WYW5kcm9pZC5wZXJtaXNzaW9uLkFDQ0VTU19XSUZJX1NUQVRF
EImtleSI6IiVzIiwicGxhdGZvcm0iOiJhbmRyb2lkIiwiZGl1IjoiJXMiLCJwa2ciOiIlcyIsIm1vZGVsIjoiJXMiLCJhcHBuYW1lIjoiJXMiLCJhcHB2ZXJzaW9uIjoiJXMiLCJzeXN2ZXJzaW9uIjoiJXMiLA=
e94ddc285669ec06b8a405dd4341eac4ea7030203010001300d06092a864886f70d010105050003818
3015060355040a130e4368696e6120556e696
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
861693111300f060355040713085368616e67686169311730
256b0f26bb2a9506be6cfdb84028ae08

安全提示信息 应用程序记录日志信息,不得记录敏感信息

应用程序记录日志信息,不得记录敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs

Files:
a3/c.java, line(s) 15
a3/d.java, line(s) 38
a3/g.java, line(s) 99
a3/t.java, line(s) 68
a3/u.java, line(s) 64,71,87,105
a3/v.java, line(s) 37
c3/a.java, line(s) 73
com/faceunity/core/utils/FULogger.java, line(s) 64,70,76,79,80
com/luanxingyuan/app/util/CodeUtil.java, line(s) 45,76
com/scwang/smartrefresh/layout/SmartRefreshLayout.java, line(s) 1173
com/tencent/av/NetworkUtil.java, line(s) 31,39,43
com/tencent/av/PingUtil.java, line(s) 46,72,98,103,66,202,204
com/tencent/av/TIMAvManager.java, line(s) 584,801,812,396,502,592,593,639,695,829,830,862,918,973,402,458,518,722,424
com/tencent/timint/TIMIntManager.java, line(s) 121,126,136
com/unionpay/utils/j.java, line(s) 19,25,21,17,23
com/yalantis/ucrop/util/ImageHeaderParser.java, line(s) 170,182,192,210,213,230,233,249,267,269,282,293,298,307
d3/b0.java, line(s) 135,138,181,188,193
d3/d.java, line(s) 15
d3/f0.java, line(s) 202,207,250,303
d3/l.java, line(s) 174,183,273,285,295,313,333,335,353,358,365,371,387,390
d3/n.java, line(s) 109,130,218,304,346
d3/o.java, line(s) 44,53
d3/s.java, line(s) 75,101,105,109,113,117,123
h3/a.java, line(s) 80,87,94,105
h3/d.java, line(s) 21
h3/j.java, line(s) 40
h9/c.java, line(s) 48,48,68
j3/d.java, line(s) 54,59,62,70,77,80
l3/k.java, line(s) 15
m3/d.java, line(s) 53,96
m3/k.java, line(s) 56,99
o9/e.java, line(s) 135
q3/a.java, line(s) 63
s2/b.java, line(s) 298
t2/d.java, line(s) 75,108
t2/e.java, line(s) 525,549,568
v2/c.java, line(s) 105
v2/e.java, line(s) 54
w2/h.java, line(s) 302,316,612
w2/i.java, line(s) 51
w2/k.java, line(s) 14
w2/z.java, line(s) 66,83,125
x2/i.java, line(s) 110,153
x2/j.java, line(s) 79,126,138,161,170,183,197,216,225
y2/e.java, line(s) 44,54,80,94
y2/i.java, line(s) 107
y8/d.java, line(s) 407
z2/a.java, line(s) 170

安全提示信息 此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它

此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard

Files:
cat/ereza/customactivityoncrash/activity/DefaultErrorActivity.java, line(s) 6,82
com/luanxingyuan/app/activity/ActorVerifyingActivity.java, line(s) 4,32
com/luanxingyuan/app/activity/ShareActivity.java, line(s) 6,374
com/luanxingyuan/app/dialog/v.java, line(s) 8,149
com/luanxingyuan/app/fragment/MineFragment.java, line(s) 6,646
com/luanxingyuan/app/util/CodeUtil.java, line(s) 5,22
com/luanxingyuan/app/util/share/ShareCopyUrl.java, line(s) 5,20

已通过安全项 此应用程序可能具有Root检测功能

此应用程序可能具有Root检测功能
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
com/luanxingyuan/app/util/ComprehensiveSecurityDetector.java, line(s) 70,39,39,39,39,39,39
com/unionpay/UPPayAssistEx.java, line(s) 201

已通过安全项 此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击

此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#testing-custom-certificate-stores-and-certificate-pinning-mstg-network-4

Files:
com/unionpay/a/b.java, line(s) 29,28,27,27
d2/k1.java, line(s) 442,304
g9/d.java, line(s) 105,104,103
g9/e.java, line(s) 124,114,123,136,122,122
g9/j.java, line(s) 107,106,105,105
g9/k.java, line(s) 228,216,227,226,226
i6/q0.java, line(s) 157,224

综合安全基线评分总结

应用图标

新暖心缘 v8.1.1

Android APK
43
综合安全评分
中风险