导航菜单

应用安全检测报告

应用安全检测报告,支持文件搜索、内容检索和AI代码分析

移动应用安全检测报告

应用图标

ASUS Phone Clone v5.40.93.16

Android APK 8bdd121d...
49
安全评分

安全基线评分

49/100

中风险

综合风险等级

风险等级评定
  1. A
  2. B
  3. C
  4. F

应用存在一定安全风险,建议优化

漏洞与安全项分布

3 高危
21 中危
2 信息
2 安全

隐私风险评估

1
第三方跟踪器

中等隐私风险
检测到少量第三方跟踪器


检测结果分布

高危安全漏洞 3
中危安全漏洞 21
安全提示信息 2
已通过安全项 2
重点安全关注 6

高危安全漏洞 默认情况下,调用Cipher.getInstance("AES")将返回AES ECB模式。众所周知,ECB模式很弱,因为它导致相同明文块的密文相同

默认情况下,调用Cipher.getInstance("AES")将返回AES ECB模式。众所周知,ECB模式很弱,因为它导致相同明文块的密文相同
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-block-cipher-mode

Files:
com/futuredial/idevicecloud/icloud/Extractor.java, line(s) 255,262

高危安全漏洞 应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。

应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/futuredial/idevicecloud/icloud/Extractor.java, line(s) 138

中危安全漏洞 Activity-Alias (com.futuredial.asusdatatransfer.DefaultLauncherActivity) 未受保护。

[android:exported=true]
检测到  Activity-Alias 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.futuredial.asusdatatransfer.StartActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Content Provider (com.futuredial.asusdatatransfer.DTSearchIndexablesProvider) 受权限保护,但应检查权限保护级别。

Permission: android.permission.READ_SEARCH_INDEXABLES [android:exported=true]
检测到  Content Provider 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Activity (com.asus.datatransfer.wireless.defaultsmsapp.SmsAppActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.asus.datatransfer.wireless.defaultsmsapp.receiver.SmsReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BROADCAST_SMS [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (com.asus.datatransfer.wireless.defaultsmsapp.receiver.MmsReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BROADCAST_WAP_PUSH [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (com.asus.datatransfer.wireless.defaultsmsapp.service.RespondService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.SEND_RESPOND_VIA_MESSAGE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (com.asus.datatransfer.wireless.defaultsmsapp.receiver.SmsNotificationClickedReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.futuredial.datatransfer.broadcast [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (com.asus.datatransfer.wireless.receiver.LocalbackupMsgReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (androidx.profileinstaller.ProfileInstallReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 高优先级 Intent(1000) - {2} 个命中

[android:priority]
通过设置较高的 Intent 优先级,应用可覆盖其他请求,可能导致安全风险。

中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等

文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10

Files:
com/asus/datatransfer/icloud/ui/database/UserTable.java, line(s) 11
com/asus/datatransfer/wireless/Const.java, line(s) 6
com/asus/datatransfer/wireless/config/Constants.java, line(s) 29,100
com/asus/datatransfer/wireless/wifi/APManager.java, line(s) 31
com/futuredial/idevicecloud/androidpim/Constants.java, line(s) 30,85
com/futuredial/idevicecloud/androidpim/QQBrowserBookmarks.java, line(s) 6
com/futuredial/idevicecloud/androidpim/WifiSetting.java, line(s) 116
com/futuredial/idevicecloud/iCloudService.java, line(s) 292,315,338,291,314,337,76
com/futuredial/idevicecloud/icloud/PList.java, line(s) 30
com/futuredial/idevicecloud/icloud/iCloudManager.java, line(s) 49,48
com/starmobile/config/Constants.java, line(s) 30,85
com/starmobile/pim/G2Settings.java, line(s) 287
com/starmobile/pim/Telephony.java, line(s) 112
com/starmobile/pim/read/Telephony.java, line(s) 115
org/jsoup/helper/W3CDom.java, line(s) 47
org/jsoup/nodes/Comment.java, line(s) 9
org/jsoup/nodes/DocumentType.java, line(s) 12,13,15

中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据

应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage

Files:
com/asus/datatransfer/icloud/ui/common/Util.java, line(s) 400
com/asus/datatransfer/wireless/Util.java, line(s) 590,2097,2100,2103
com/asus/datatransfer/wireless/appdata/Impl/AppDataManagerImpl.java, line(s) 164
com/asus/datatransfer/wireless/config/BlackListConfig.java, line(s) 50
com/asus/datatransfer/wireless/config/EnvConfig.java, line(s) 59,61
com/asus/datatransfer/wireless/content/manager/AppManager.java, line(s) 243
com/asus/datatransfer/wireless/content/manager/FileManager.java, line(s) 80,81
com/asus/datatransfer/wireless/content/manager/ModuleManager.java, line(s) 624,641,648
com/asus/datatransfer/wireless/content/manager/WholeStorageManager.java, line(s) 478,478
com/asus/datatransfer/wireless/net/RetrofitClient.java, line(s) 42
com/asus/datatransfer/wireless/service/DataComModule.java, line(s) 1013
com/asus/datatransfer/wireless/task/runnable/AppRunnable.java, line(s) 165
com/asus/datatransfer/wireless/transfer/server/FileReceiver.java, line(s) 128,130,142,167,192,201
com/futuredial/adtres/Logger.java, line(s) 19
com/futuredial/asusdatatransfer/StartActivity.java, line(s) 66,800
com/futuredial/idevicecloud/Utility.java, line(s) 267
com/futuredial/idevicecloud/androidpim/G2File.java, line(s) 31,58,59,62
com/starmobile/pim/G2File.java, line(s) 30,57,58,61

中危安全漏洞 应用程序创建临时文件。敏感信息永远不应该被写进临时文件

应用程序创建临时文件。敏感信息永远不应该被写进临时文件


Files:
com/journeyapps/barcodescanner/CaptureManager.java, line(s) 262

中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库

应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2

Files:
com/asus/datatransfer/icloud/ui/database/DBHelper.java, line(s) 6,65,84,92,99,112
com/asus/datatransfer/icloud/ui/database/UserTable.java, line(s) 3,21
com/asus/datatransfer/wireless/database/AppsTable.java, line(s) 5,34,43
com/asus/datatransfer/wireless/database/Content/ContentDBHelper.java, line(s) 6,133,141,154
com/asus/datatransfer/wireless/database/Content/ContentTable.java, line(s) 3,22
com/asus/datatransfer/wireless/database/Content/ZenUIAppsTable.java, line(s) 5,29
com/asus/datatransfer/wireless/database/DBHelper.java, line(s) 6,346
com/asus/datatransfer/wireless/database/FilesTable.java, line(s) 5,37,46
com/asus/datatransfer/wireless/database/FilesTransferStatusTable.java, line(s) 5,41
com/asus/datatransfer/wireless/database/ModulesTable.java, line(s) 5,27
com/asus/datatransfer/wireless/database/TransferRecordTable.java, line(s) 5,37,46
com/futuredial/idevicecloud/pim/BookMarkDB.java, line(s) 4,28
com/futuredial/idevicecloud/pim/CalendarDB.java, line(s) 4,52
com/futuredial/idevicecloud/pim/CloudDB.java, line(s) 4,5,67,86
com/futuredial/idevicecloud/pim/PhoneBookDB.java, line(s) 4,5,270,342,432

中危安全漏洞 可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息

可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-6

Files:
com/asus/datatransfer/icloud/ui/ConnectICloud.java, line(s) 313,318,309
com/asus/datatransfer/icloud/ui/LoginICloud.java, line(s) 110,115,106
com/asus/datatransfer/icloud/ui/TransmissionActivity.java, line(s) 584,589,580

中危安全漏洞 IP地址泄露

IP地址泄露


Files:
com/asus/datatransfer/wireless/wifi/APManager.java, line(s) 376,392,380
com/asus/datatransfer/wireless/wifi/WifiController.java, line(s) 29
com/futuredial/asusdatatransfer/BuildConfig.java, line(s) 8

中危安全漏洞 SHA-1是已知存在哈希冲突的弱哈希

SHA-1是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
com/asus/datatransfer/wireless/Util.java, line(s) 2074
com/futuredial/idevicecloud/Utility.java, line(s) 476
com/futuredial/idevicecloud/icloud/Extractor.java, line(s) 198,92

中危安全漏洞 应用程序使用不安全的随机数生成器

应用程序使用不安全的随机数生成器
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-random-number-generators

Files:
org/jsoup/helper/DataUtil.java, line(s) 15

中危安全漏洞 应用程序包含隐私跟踪程序

此应用程序有多个1隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。

中危安全漏洞 此应用可能包含硬编码机密信息

从应用程序中识别出以下机密确保这些不是机密或私人信息
"password" : "Passwort"
"target_hotspot_password" : "Lozinka:"
"target_hotspot_password" : "Wachtwoord:"
"target_hotspot_password" : "Contrasenya:"
"password" : "Password"
"url_of_article_factor_authentication" : "article"
"target_hotspot_password" : "Password:"
"password" : "Senha"
"target_hotspot_password" : "Parool:"
"ap_no_key" : "Paroolita"
"password" : "Palavra-passe"
"google_app_id" : "1:397096798937:android:6d9d159f86df52c5"
"target_hotspot_password" : "Geslo:"
"password" : "Lozinka"
"password" : "Zaporka"
"password" : "Heslo"
"password" : "Parole"
"library_zxingandroidembedded_authorWebsite" : "https://journeyapps.com/"
"password" : "Adgangskode"
"firebase_database_url" : "https://asus-data-transfer.firebaseio.com"
"password" : "Contrasenya"
"library_zxingandroidembedded_author" : "JourneyApps"
"password" : "Sandi"
"target_hotspot_password" : "Parole:"
"target_hotspot_password" : "Adgangskode:"
"password" : "Salasana"
"target_hotspot_password" : "Passord:"
"two_factor_authentication" : "Zweifaktor-Authentifizierung"
"google_crash_reporting_api_key" : "AIzaSyCkOyA9UJFCknT59QhRD7x0NvKaDRWYOyA"
"password" : "Geslo"
"target_hotspot_password" : "Salasana:"
"password" : "Parool"
"target_hotspot_password" : "Kennwort:"
"password" : "Passord"
"google_api_key" : "AIzaSyCkOyA9UJFCknT59QhRD7x0NvKaDRWYOyA"
"two_factor_authentication" : "Tofaktorautentisering"
"target_hotspot_password" : "Palavra-passe:"
"target_hotspot_password" : "Senha:"
"target_hotspot_password" : "Heslo:"
"target_hotspot_password" : "Parola:"
"password" : "Wachtwoord"
clientMasteringNumber=2014Hotfix39
03f107a4d94d189538de09cdbf86c0f1
6B1E562C-C72D-4F05-85EC-CF78A2B4FEE1
TGlzdEFwcGw6MTpBcHBsOjE6Aa+rCRHn4QtQTsax5amQdtadP1iU3U2KceYqsMQ8k4p38A4zyOz/SFza4p19RFXPBQiJ2jP4lfFOSe2CC+t96CYIqCHrxExB4oEZS3t4hdrpx5JtTOplT0qLS7MQd55F7wyxaMD0x2XAf8DZl2utXx5mn1bkRE5hW0CZyGIXE1V4fMT4U1uFhQ==
A96E47BE753E97A505809CC5993378D6E73948FCD9A3FDAFBB68A98316AFC30998148CBD7041F908E5F0648BE283CA8C14A53F456FA1EF2FEF8AF41AD1648BDA9862198082333270DC6AB8109562762757CE0219BAF7F9B122155506AFB5A87C948154FDFC306A97E5FE8629043CACF6E0B7C70EB58460DA
XQkjlPLgx951pLNaIwJTqnndgPpQ3w8H4LLA5IVrm3Fk9gXetla7yyqLbtSnDX4GVoZWKOJw
d39ba9916b7251055b22c7f910e2ea796ee65e98b2ddecea8f5dde8d9d1a815d
XQkjlPLgx951pLNaIwJTqnncNSOzNiH5eNvVpOwcxpGVRYI5bdJZlGZzA7FD9XHL2F3bI
XQkjlPLgx951pLNaIwJTqnnafFsIWC1hdgvSXa3VpWDxZBBTMlw5965B0yVEBfvjgWgRn6HQ
OoFHhDo52cv5BmHqGryQnzPyTGDoNdhYlSw4pppCN7isrKRpuimVZxaobPDhSAMRbkYENnwDujMzadegjBwW87Qam0BiMU2wu1HzTutIpr09vVxf4bgB0PRt1qp16B2IP3AurTJUJ8dLgzVa8KEfpDeciw
kE5NkU0N0JFNzUzRTk3QTUwNTgwOUNDNTk5MzM3OEQ2RTczOTQ4RkNEOUEzRkRBRkJCNjhBOTgzMTZBRkMzMDk5ODE0OENCRDcwNDFGOTA4RTVGMDY0OEJFMjgzQ0E4QzE0QTUzRjQ1NkZBMUVGMkZFRjhBRjQxQUQxNjQ4QkRBOTg2MjE5ODA4MjMzMzI3MERDNkFCODEwOTU2Mjc2Mjc1N0NFMDIxOUJBRjdGOUIxMjIxNTU1MDZBRkI1QTg3Qzk0ODE1NEZERkMzMDZBOTdFNUZFODYyOTA0M0NBQ0Y2RTBCN0M3MEVCNTg0NjBEQXwxAAABksIsfokjHyw2VlMpsetUove6anCNJ9HVm8eGr76tZ
KgHsgd3WnmyhrQ8SHZAAM6v2olgCJlUbE4iOk4nvqFWnZhMy31tv9lUss7mGpgFnlGHhjdLg
clientMasteringNumber=2317Hotfix58

安全提示信息 应用程序记录日志信息,不得记录敏感信息

应用程序记录日志信息,不得记录敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs

Files:
com/asus/commonres/AsusResTabUtils.java, line(s) 62,141,154,183,225
com/asus/commonres/AsusResUtils.java, line(s) 376,394,396
com/asus/commonres/RogFeatureManager.java, line(s) 26
com/asus/commonres/VibrateUtils.java, line(s) 33,39,51,54
com/asus/commonresx/AsusResxTabUtils.java, line(s) 63,142,155,184
com/asus/commonresx/widget/AdjustableToolbarLayout.java, line(s) 119
com/asus/datatransfer/icloud/ui/BaseActivity.java, line(s) 445
com/asus/datatransfer/icloud/ui/BaseActivityBititle.java, line(s) 520
com/asus/datatransfer/wireless/MyAsyncTask.java, line(s) 152
com/asus/datatransfer/wireless/config/DeviceInfo.java, line(s) 48,49,50
com/asus/datatransfer/wireless/config/EnvConfig.java, line(s) 20
com/asus/datatransfer/wireless/task/runnable/TunnelAppRunnable.java, line(s) 64
com/futuredial/adtres/Logger.java, line(s) 38,44,51,79,72,86,24,31,58,65,93,99
com/futuredial/adtres/ThemeChangeReceiver.java, line(s) 32,47,59,65,73,42
com/futuredial/adtres/vectorchildfinder/PathParser.java, line(s) 482,487
com/futuredial/adtres/vectorchildfinder/VectorDrawableCompat.java, line(s) 399,402,557,562,1182
com/futuredial/asusdatatransfer/HideLauncherIcon.java, line(s) 13
com/futuredial/asusdatatransfer/PackageReplacedReceiver.java, line(s) 13
com/futuredial/idevicecloud/GetPhoto/PhotoThreadPool.java, line(s) 26,31,36,42
com/futuredial/idevicecloud/androidpim/G2Task.java, line(s) 144,202,726,58,67,97,101,108,111,116,129,135,139,177,221,692,768,775,785,820,854,438
com/futuredial/idevicecloud/androidpim/Regex.java, line(s) 30
com/futuredial/idevicecloud/androidpim/SqliteWrapper.java, line(s) 22,32,42,52,62
com/futuredial/idevicecloud/common/ItemSerializable.java, line(s) 38,45,49,53,92
com/journeyapps/barcodescanner/CameraPreview.java, line(s) 653,680,148,249,350,773,511,753
com/journeyapps/barcodescanner/CaptureManager.java, line(s) 95,116,268
com/journeyapps/barcodescanner/DecoderThread.java, line(s) 119
com/journeyapps/barcodescanner/camera/AutoFocusManager.java, line(s) 69,93,110
com/journeyapps/barcodescanner/camera/CameraConfigurationUtils.java, line(s) 46,58,60,80,83,88,98,116,122,124,131,133,137,142,144,148,159,162,167,172,188,191,196,201,217,223,233,234,238,243,204
com/journeyapps/barcodescanner/camera/CameraInstance.java, line(s) 26,38,53,66,213,30,45,58,70
com/journeyapps/barcodescanner/camera/CameraManager.java, line(s) 54,71,345,356,179,209,248,175,181,262,270
com/journeyapps/barcodescanner/camera/CenterCropStrategy.java, line(s) 27
com/journeyapps/barcodescanner/camera/FitCenterStrategy.java, line(s) 27
com/journeyapps/barcodescanner/camera/LegacyPreviewScalingStrategy.java, line(s) 42,43,73
com/journeyapps/barcodescanner/camera/PreviewScalingStrategy.java, line(s) 22,23
com/starmobile/pim/Regex.java, line(s) 30

安全提示信息 应用与Firebase数据库通信

该应用与位于 https://asus-data-transfer.firebaseio.com 的 Firebase 数据库进行通信

已通过安全项 此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击

此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#testing-custom-certificate-stores-and-certificate-pinning-mstg-network-4

Files:
com/asus/datatransfer/wireless/net/RetrofitClient.java, line(s) 33,33

已通过安全项 Firebase远程配置已禁用

Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/397096798937/namespaces/firebase:fetch?key=AIzaSyCkOyA9UJFCknT59QhRD7x0NvKaDRWYOyA ) 已禁用。响应内容如下所示:

{
    "state": "NO_TEMPLATE"
}

重点安全关注 应用程序可能与位于OFAC制裁国家 (中国) 的服务器 (p215-ckdatabasews.icloud.com.cn) 通信。

{'ip': '111.206.109.112', 'country_short': 'CN', 'country_long': '中国', 'region': '北京', 'city': '北京', 'latitude': '39.907501', 'longitude': '116.397102'}

重点安全关注 应用程序可能与位于OFAC制裁国家 (中国) 的服务器 (configuration.apple.com) 通信。

{'ip': '111.206.109.108', 'country_short': 'CN', 'country_long': '中国', 'region': '江苏', 'city': '扬州', 'latitude': '32.397221', 'longitude': '119.435600'}

重点安全关注 应用程序可能与位于OFAC制裁国家 (中国) 的服务器 (event.asus.com.cn) 通信。

{'ip': '222.187.225.3', 'country_short': 'CN', 'country_long': '中国', 'region': '江苏', 'city': '宿迁', 'latitude': '33.933334', 'longitude': '118.283333'}

重点安全关注 应用程序可能与位于OFAC制裁国家 (中国) 的服务器 (support.apple.com) 通信。

{'ip': '17.23.96.13', 'country_short': 'CN', 'country_long': '中国', 'region': '浙江', 'city': '台州', 'latitude': '28.666668', 'longitude': '121.349998'}

重点安全关注 应用程序可能与位于OFAC制裁国家 (中国) 的服务器 (setup.icloud.com.cn) 通信。

{'ip': '111.206.109.112', 'country_short': 'CN', 'country_long': '中国', 'region': '北京', 'city': '北京', 'latitude': '39.907501', 'longitude': '116.397102'}

重点安全关注 应用程序可能与位于OFAC制裁国家 (中国) 的服务器 (www.icloud.com.cn) 通信。

{'ip': '111.206.109.112', 'country_short': 'CN', 'country_long': '中国', 'region': '江苏', 'city': '扬州', 'latitude': '32.397221', 'longitude': '119.435600'}

综合安全基线评分总结

应用图标

ASUS Phone Clone v5.40.93.16

Android APK
49
综合安全评分
中风险