导航菜单

应用安全检测报告

应用安全检测报告,支持文件搜索、内容检索和AI代码分析

移动应用安全检测报告

应用图标

Playback Mic Pro v121

Android APK b6edb41b...
47
安全评分

安全基线评分

47/100

中风险

综合风险等级

风险等级评定
  1. A
  2. B
  3. C
  4. F

应用存在一定安全风险,建议优化

漏洞与安全项分布

4 高危
17 中危
5 信息
2 安全

隐私风险评估

2
第三方跟踪器

中等隐私风险
检测到少量第三方跟踪器


检测结果分布

高危安全漏洞 4
中危安全漏洞 17
安全提示信息 5
已通过安全项 2
重点安全关注 2

高危安全漏洞 Activity (eu.timetools.playbacknmi.ui.MainActivity) 易受 StrandHogg 2.0 攻击

检测到 Activity 存在 StrandHogg 2.0 任务劫持漏洞。攻击者可将恶意 Activity 置于易受攻击应用的任务栈顶部,使应用极易成为钓鱼攻击目标。可通过将启动模式设置为 "singleInstance" 并将 taskAffinity 设为空(taskAffinity=""),或将应用的 target SDK 版本(27)升级至 29 及以上,从平台层面修复该漏洞。

高危安全漏洞 Activity (com.begal.appclone.classes.DefaultProvider$MyActivity) 易受 StrandHogg 2.0 攻击

检测到 Activity 存在 StrandHogg 2.0 任务劫持漏洞。攻击者可将恶意 Activity 置于易受攻击应用的任务栈顶部,使应用极易成为钓鱼攻击目标。可通过将启动模式设置为 "singleInstance" 并将 taskAffinity 设为空(taskAffinity=""),或将应用的 target SDK 版本(27)升级至 29 及以上,从平台层面修复该漏洞。

高危安全漏洞 启用了调试配置。生产版本不能是可调试的

启用了调试配置。生产版本不能是可调试的
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04c-Tampering-and-Reverse-Engineering.md#debugging-and-tracing

Files:
andhook/lib/BuildConfig.java, line(s) 3,6
com/begal/appclone/classes/BuildConfig.java, line(s) 3,6

高危安全漏洞 默认情况下,调用Cipher.getInstance("AES")将返回AES ECB模式。众所周知,ECB模式很弱,因为它导致相同明文块的密文相同

默认情况下,调用Cipher.getInstance("AES")将返回AES ECB模式。众所周知,ECB模式很弱,因为它导致相同明文块的密文相同
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-block-cipher-mode

Files:
com/begal/appclone/classes/util/SimpleCrypt.java, line(s) 55

中危安全漏洞 应用已启用明文网络流量

[android:usesCleartextTraffic=true]
应用允许明文网络流量(如 HTTP、FTP 协议、DownloadManager、MediaPlayer 等)。API 级别 27 及以下默认启用,28 及以上默认禁用。明文流量缺乏机密性、完整性和真实性保护,攻击者可窃听或篡改传输数据。建议关闭明文流量,仅使用加密协议。

中危安全漏洞 应用数据允许备份

[android:allowBackup=true]
该标志允许通过 adb 工具备份应用数据。启用 USB 调试的用户可直接复制应用数据,存在数据泄露风险。

中危安全漏洞 Broadcast Receiver (androidx.profileinstaller.ProfileInstallReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Content Provider (com.begal.appclone.classes.DefaultProvider) 未受保护。

[android:exported=true]
检测到  Content Provider 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Service (com.begal.appclone.service.RemoteService) 未受保护。

[android:exported=true]
检测到  Service 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.begal.appclone.classes.DefaultProvider$DefaultReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.begal.appclone.classes.DefaultProvider$MyActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 IP地址泄露

IP地址泄露


Files:
com/begal/appclone/classes/HostsBlocker.java, line(s) 147
com/cloudinject/customview/C0019.java, line(s) 496
com/cloudinject/customview/C0128.java, line(s) 496
mirrorb/android/app/job/C0028.java, line(s) 122
mirrorb/android/app/job/C0031.java, line(s) 377
mirrorb/android/app/job/C0228.java, line(s) 122
mirrorb/android/app/job/C0231.java, line(s) 377
mirrorb/android/app/role/C0034.java, line(s) 592
mirrorb/android/app/role/C0234.java, line(s) 592
mirrorb/android/app/servertransaction/C0037.java, line(s) 126
mirrorb/android/app/servertransaction/C0237.java, line(s) 126
mirrorb/android/bluetooth/C0041.java, line(s) 310
mirrorb/android/bluetooth/C0241.java, line(s) 310
mirrorb/android/graphics/drawable/C0044.java, line(s) 117
mirrorb/android/graphics/drawable/C0244.java, line(s) 117
mirrorb/android/hardware/display/C0045.java, line(s) 431
mirrorb/android/hardware/display/C0245.java, line(s) 431
mirrorb/android/media/session/C0047.java, line(s) 556
mirrorb/android/media/session/C0247.java, line(s) 556
mirrorb/android/net/wifi/C0052.java, line(s) 131
mirrorb/android/net/wifi/C0252.java, line(s) 131
mirrorb/android/os/storage/C0056.java, line(s) 602
mirrorb/android/os/storage/C0256.java, line(s) 602
mirrorb/android/providers/C0058.java, line(s) 376
mirrorb/android/providers/C0258.java, line(s) 376
mirrorb/android/rms/C0062.java, line(s) 365
mirrorb/android/rms/C0063.java, line(s) 373
mirrorb/android/rms/C0262.java, line(s) 365
mirrorb/android/rms/C0263.java, line(s) 373
mirrorb/android/security/net/config/C0064.java, line(s) 193
mirrorb/android/security/net/config/C0264.java, line(s) 193
mirrorb/android/service/persistentdata/C0066.java, line(s) 187,263
mirrorb/android/service/persistentdata/C0067.java, line(s) 314
mirrorb/android/service/persistentdata/C0266.java, line(s) 187,263
mirrorb/android/service/persistentdata/C0267.java, line(s) 314
mirrorb/android/view/accessibility/C0071.java, line(s) 317
mirrorb/android/view/accessibility/C0271.java, line(s) 317
mirrorb/android/webkit/C0072.java, line(s) 606
mirrorb/android/webkit/C0073.java, line(s) 153
mirrorb/android/webkit/C0272.java, line(s) 606
mirrorb/android/webkit/C0273.java, line(s) 153
mirrorb/java/io/C0090.java, line(s) 141
mirrorb/java/io/C0290.java, line(s) 141

中危安全漏洞 应用程序使用不安全的随机数生成器

应用程序使用不安全的随机数生成器
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-random-number-generators

Files:
i8/a.java, line(s) 3
i8/b.java, line(s) 4
j8/a.java, line(s) 4
k1/l1.java, line(s) 7
k2/v0.java, line(s) 4
mirrorb/android/providers/C0057.java, line(s) 61
mirrorb/android/providers/C0257.java, line(s) 61

中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库

应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2

Files:
f1/m0.java, line(s) 7,8,266,300,319,328,378,485,502,758
f1/t0.java, line(s) 4,5,135

中危安全漏洞 应用程序创建临时文件。敏感信息永远不应该被写进临时文件

应用程序创建临时文件。敏感信息永远不应该被写进临时文件


Files:
com/begal/appclone/classes/Utils.java, line(s) 427
q5/c.java, line(s) 80

中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等

文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10

Files:
a5/e.java, line(s) 85

中危安全漏洞 MD5是已知存在哈希冲突的弱哈希

MD5是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
andhook/lib/xposed/XposedHelpers.java, line(s) 1087

中危安全漏洞 SHA-1是已知存在哈希冲突的弱哈希

SHA-1是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
q5/b.java, line(s) 55

中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据

应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage

Files:
cd/C0014.java, line(s) 230
cd/C0110.java, line(s) 230
com/begal/appclone/classes/BundleObb.java, line(s) 106
v6/a.java, line(s) 25

中危安全漏洞 应用程序包含隐私跟踪程序

此应用程序有多个2隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。

中危安全漏洞 此应用可能包含硬编码机密信息

从应用程序中识别出以下机密确保这些不是机密或私人信息
"com.google.firebase.crashlytics.mapping_file_id" : "f6df8bfe893946629975ee38939b7114"
"firebase_database_url" : "https://playback-mic.firebaseio.com"
"google_api_key" : "AIzaSyBA_IF-94WZlMR7cdFwYBjyH1sGQ0k4TwA"
"google_app_id" : "1:541294567202:android:b65f51b73ad55879444f7b"
"google_crash_reporting_api_key" : "AIzaSyBA_IF-94WZlMR7cdFwYBjyH1sGQ0k4TwA"
nEWYD347Bz/VmtmYM96cSWoCWRCLMJVsE38naNXQ+k30gdExyI+kVj3Z1fpu0Jssdnp1GWxEkHSTp
n+ZGkpzrId6ak3RlpLm1xz5kePn0QOrZ5A3H9GIMf80wHeZ+l7OZo6Qh7HwFWh45t3iCsKEiATkXo
nnEP6ewBXAAflTa7oYJUhwJEetmtGlXCvCL+m3LNYblk7NznmCXnpivcDfARoGWQz+wH3PlZaTRjs
Y29tLmFwcGxpc3RvLmFwcGNsb25lci5jbGFzc2VzLnNlY29uZGFyeQ==
nlwr5ETjezBRsKULS6ZJWAU8xvoIPcBxwGQRaC5I0iNvycX7oSARkPgQQQNKjwHJgQugIBGYiVLwY
noCasBeYxdhEKpQwBfJ50pb7yY2abgNmki7C4F0QoQ4DC2slIhFm4VchWLJb0nGeaa3F9QicidEUf
nd7qkHRn2vssMU5VdE3xYVka86jITBsDMNuBGM2mjDa9lhqhj7ifnqmsbvLfG5CH0PGDUkNXMvqV4
nxtAB6Dkkzc+55W9DaF97Fkkv5BBgPHxbUjgkvZgS+F2SbgztX10o9cGJpAXA1cB03BOr94DlZvZT
nYfAXeebVnyGCJC3JuHeGh1/vFx2nMjvh++m8iTvax9jMPgHOBv5OMXlE0tICyhR86SYXchted46h
nZWtL6D4gxleEjTgRsiZreZ8nNC9qRwx6BC0WIWuyNpCzY/YJalfUgLEw4LPgFs0T+snumNuJ4BOD
nbmhoaGhoaMig8M5S0hTgENxxYMk8kg9v+nAPg34ys79CB6GnkDt8Q5KGon97Er8nPxu1LWU8UsbB
nAP7xsB0qOvNGAL+5kIrOvBGghKD60AgQmEYAONDD9oSiM98ndOlrwNdAPL4fjn7G/UKyedoX+C60
n5cgy1k4ASf3A5cAFuJXKKaF9KpBPgDvM7KP4g1oIIGkCMADcBJwb2p8KOMvMPoUaCCBpALgfmBba
n78C8qoIPewXwOcK9V1kHzIi2qlRGLEB3LDSVx3KgP3rEWSlxHzAZt8OgljPjEvkcWGJmr4dyoA/A
nJBUhcameExFCkEhow4NEJCIST32oW4TEg3ogbg+NklAaSl1KFG2lNGlJimqU0/P3sGZ0nLNn9qx9
n4EPbNtXMNgNzgO0pJjfLc54Q9QnnUoOaUIYAPh3VtjxGkQhzM+wXdSDCxzgR/iipbLkIXQNuy2sY
470fa2b4ae81cd56ecbcda9735803434cec591fa
n+AxcP7sT90e4wsx2lRLoVkh6KOeOs1Z8IekeSce3yWOWpL9T0tglaWGb+w/x8OmdyoJXQPCPkDTc
n2olwU2SXZdN1AtzmEfwtI+49oSQRspqj1yT9EUqAMoahx3rYvpW8MLONwFzglxT7WyQ97eOMmX0M
nbz2PpFXK5obQPvYskh5WPqaG9rXnkDRR0q6cAjxZdP59oQNQA84ADshpO6vozBsB4DAP2/2KzrwR
nJ2k5MBi65DXhQ6iwE5b0BHBP6FLXhB3AUWa2u5ImSNKdNMFPcp2Z7YYKaoCkmcDa0CWuCVuBu8zs
e1c11896715177e8674c72c2c4727324
njY7OJr0mLOpwiHpt4BgUi6Q3PCZi8h1SSjpR0vaM9LxEkHSMh69dMRHz7agGfUSIhqhzKG50dHiJ
nCXBIWXMAAC4jAAAuIwF4pT92AAAHk0lEQVR42u2dW6wdUxjHf98pirqURElc6tIihKZOL0rqLiEl
n6ILXhSq+P2Ae7qsIh4HV0REDDQ314F/QQmVQhaYmuwAAAABJRU5ErkJggg==
nzHYAd4WORoWsA241sxkhgw8jJi6SHgPuC+lQifwMvAu8ZGavhnYmptVM+CLc4RUzgEm42eiehP2E
bc00deb472afb865e3ca11a0804c7fb2b61c1f34bbdc587b8289a60689d2268d5e2806e339428007
nsw0NDQ0NDQ0FUesnYpIOBE4BTsKt2ewLTEyYDCfK0MfeUYzYO8ROjmQsca3o2lrYFJm2AXuAL81s
b80c897ce5120ed00000242d50cf1f9f

安全提示信息 应用程序记录日志信息,不得记录敏感信息

应用程序记录日志信息,不得记录敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs

Files:
andhook/lib/AndHook.java, line(s) 56,104
andhook/lib/HookHelper.java, line(s) 34,67,87,139,150,163,184,205,226,261,266,79
andhook/lib/xposed/XposedBridge.java, line(s) 30,26
andhook/lib/xposed/XposedHelpers.java, line(s) 468,479,490,501,512,523,534,545,556,567,582,593,604,615,626,637,648,659,670,681,692,703,714,725,736,747,758,769,780,791,802,813,824,835,846,857,868,881,894,907,928,943
b1/a.java, line(s) 15,22,29,14,21,28,42,43,49,50
b3/a.java, line(s) 114,150
b3/d.java, line(s) 23,41,50,60
c3/e0.java, line(s) 53,55,49
c3/f.java, line(s) 65,32,49,108,114,123,126
c3/g.java, line(s) 39,117
c3/q.java, line(s) 49
c3/u.java, line(s) 68,86,90,118,125,51
c3/z.java, line(s) 31,34,48
com/begal/appclone/classes/AbstractActivityContentProvider.java, line(s) 25,31
com/begal/appclone/classes/AppClonerNative.java, line(s) 16
com/begal/appclone/classes/ApplicationWrapper.java, line(s) 31,189,196,203,210,217,58,70,86,98,110,122,134,146,158,175
com/begal/appclone/classes/AutoPressButtons.java, line(s) 31,44,62,67,72,91,106,120,100,122,126,130,153
com/begal/appclone/classes/AutoRotateControls.java, line(s) 18,19,38,45,36,50
com/begal/appclone/classes/BackKeyHandler.java, line(s) 33,35,43,52,64,72,85,54,94
com/begal/appclone/classes/BluetoothControls.java, line(s) 18,19,37,40,45,52,58,61,43,64
com/begal/appclone/classes/BootReceiver.java, line(s) 14,24
com/begal/appclone/classes/BundleFilesDirectories.java, line(s) 18,30,38,46,61,41,66
com/begal/appclone/classes/BundleObb.java, line(s) 20,30,33,44,53,84,87
com/begal/appclone/classes/CalculatorActivity.java, line(s) 52,62,125,251
com/begal/appclone/classes/ClearCacheOnExitProvider.java, line(s) 16,43,47,21,39,52
com/begal/appclone/classes/ClearCacheOnExitService.java, line(s) 18,24
com/begal/appclone/classes/ClearCacheReceiver.java, line(s) 15
com/begal/appclone/classes/CloneSettings.java, line(s) 63,200,211,49,72,77,208
com/begal/appclone/classes/Configuration.java, line(s) 22,44,63,67,70,77,87,97,36,58,81,91,101
com/begal/appclone/classes/ConfirmExit.java, line(s) 14
com/begal/appclone/classes/CrashHandler.java, line(s) 71,80,94,26,60,82,98
com/begal/appclone/classes/DefaultFontProvider.java, line(s) 32
com/begal/appclone/classes/DefaultProvider.java, line(s) 42,78,83,91,95,111,57,70,102,117,175,182
com/begal/appclone/classes/DisableCameras.java, line(s) 24,45,62,80,100,106,126,140,28,57,75,93,121,133
com/begal/appclone/classes/DisableClipboardAccess.java, line(s) 58,94,98,102,109,116,122,128,145,149,153,157,161,165,174,186,191,202,206,210,217,224,230,236,253,257,261,265,269,273,282,294,299,308,338,347,353,358,362,379,396,72,136,244,301,340,365,382,398
com/begal/appclone/classes/FacebookLoginBehavior.java, line(s) 14,34
com/begal/appclone/classes/FacebookMessengerProvider.java, line(s) 36,38
com/begal/appclone/classes/FakeCalculator.java, line(s) 14,22,29,32
com/begal/appclone/classes/GmailSupport.java, line(s) 35,38,50,100,113,125,130,149,167,183,185,195,197,213,220,227,40,104,108,135,143,160,222
com/begal/appclone/classes/HeadphonesEventReceiver.java, line(s) 12,24,31,18,44
com/begal/appclone/classes/HostsBlocker.java, line(s) 83,111,119,133,155,158,169,222,249,257,265,270,305,316,325,334,345,358,426,103,121,281,297,348,441
com/begal/appclone/classes/InterruptionFilterControls.java, line(s) 21,22,37,47,48,57,62,64
com/begal/appclone/classes/LaunchTileService.java, line(s) 16,21,28
com/begal/appclone/classes/LogcatViewer.java, line(s) 49,308,63,147
com/begal/appclone/classes/NotificationOptions.java, line(s) 142,143,144,145,146,147,148,149,150,151,152,153,154,155,156,157,158,159,160,161,162,163,164,165,166,167,168,169,170,188,193,198,200,250,302,319,326,93,233,241,252,256,285,355
com/begal/appclone/classes/OnAppExitListener.java, line(s) 19,26
com/begal/appclone/classes/OpenLinksWith.java, line(s) 26,42,50
com/begal/appclone/classes/PasswordActivity.java, line(s) 61,86,96,101,69,90,156,162,177,188
com/begal/appclone/classes/PasswordProvider.java, line(s) 12,14,21,24
com/begal/appclone/classes/PenEventReceiver.java, line(s) 12,17,35
com/begal/appclone/classes/PersistentApp.java, line(s) 13,21
com/begal/appclone/classes/PersistentAppService.java, line(s) 18
com/begal/appclone/classes/PictureInPicture.java, line(s) 28,34,40,52,63,73,83,65,88
com/begal/appclone/classes/PowerEventReceiver.java, line(s) 12,16,19,23,27,30,40
com/begal/appclone/classes/PreferenceEditor.java, line(s) 24,26,29,39,56,64
com/begal/appclone/classes/PressBackAgainToExit.java, line(s) 17,32,54
com/begal/appclone/classes/SecretDialerCodeReceiver.java, line(s) 15,25
com/begal/appclone/classes/SetBrightnessOnStart.java, line(s) 22,23,38,46,88,58,67,82,98,104
com/begal/appclone/classes/ShowOnLockScreen.java, line(s) 14,25
com/begal/appclone/classes/Signatures.java, line(s) 36,55,58,94,98,109,113,145,82,88,140,149,152,169,179,202,215
com/begal/appclone/classes/StartExitAppEventReceiver.java, line(s) 19,39,48,61,34,56,66
com/begal/appclone/classes/ToastFilter.java, line(s) 25,29,55,61,89,81,91
com/begal/appclone/classes/TrustAllCertificatesProvider.java, line(s) 37,39
com/begal/appclone/classes/Utils.java, line(s) 68,75,87,90,519,105,109,124,164,174,184,195,216,226,240,322,441,482,524,537,574,609
com/begal/appclone/classes/WhatsAppSupport.java, line(s) 30,59,72,45,62,66,85
com/begal/appclone/classes/WifiControls.java, line(s) 18,19,37,40,45,52,58,61,43,64
com/begal/appclone/classes/freeform/FreeFormWindow.java, line(s) 35,39,44,59
com/begal/appclone/classes/freeform/FreeFormWindowActivity.java, line(s) 37,53,56,76,96,59,89
com/begal/appclone/classes/service/RemoteService.java, line(s) 20
com/begal/appclone/classes/util/IActivityManagerHook.java, line(s) 19
com/begal/appclone/classes/util/IPackageManagerHook.java, line(s) 20
e3/a.java, line(s) 18
e3/a0.java, line(s) 45
e3/b.java, line(s) 178,196,355,359,363,369
e3/g0.java, line(s) 53,58
e3/k0.java, line(s) 50
e3/t.java, line(s) 33
e3/w.java, line(s) 101
e3/x.java, line(s) 28
e3/y.java, line(s) 20
e4/d.java, line(s) 160,193
f4/b.java, line(s) 40
g3/b.java, line(s) 54,65
h0/c.java, line(s) 111,132,126
h3/e.java, line(s) 16
h3/m.java, line(s) 16,15
h4/g.java, line(s) 406
j0/a.java, line(s) 30
java/io/ByteArrayOutputStrean.java, line(s) 13,17,18,35,20
k3/d.java, line(s) 36,100
m/d.java, line(s) 206
p4/e.java, line(s) 238,177,181,193
q0/b.java, line(s) 30
q5/b.java, line(s) 59,76
r0/m0.java, line(s) 34
r5/c.java, line(s) 95,98,120,128,129,150,156
s3/c.java, line(s) 52
s4/f.java, line(s) 33,40,43,52,86
s4/n.java, line(s) 130
v4/f.java, line(s) 31,41,18,51,61,71
w/g.java, line(s) 136
y0/k.java, line(s) 36,65,72,75,92,97,102,107,112
y2/r.java, line(s) 42,37,32,27
y4/n.java, line(s) 190,191,192,193,194,195,196,197,198,199,200,201,202,203,204,205,206,207,208
z/c.java, line(s) 422

安全提示信息 应用程序可以写入应用程序目录。敏感信息应加密

应用程序可以写入应用程序目录。敏感信息应加密


Files:
d0/a.java, line(s) 77,77

安全提示信息 此应用侦听剪贴板更改。一些恶意软件也会监听剪贴板更改

此应用侦听剪贴板更改。一些恶意软件也会监听剪贴板更改
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard

Files:
com/begal/appclone/classes/DisableClipboardAccess.java, line(s) 45,117,117,123,123,132,225,225,231,231,240,9

安全提示信息 此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它

此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard

Files:
com/begal/appclone/classes/DisableClipboardAccess.java, line(s) 9,70,359

安全提示信息 应用与Firebase数据库通信

该应用与位于 https://playback-mic.firebaseio.com 的 Firebase 数据库进行通信

已通过安全项 此应用程序可能具有Root检测功能

此应用程序可能具有Root检测功能
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
y4/h.java, line(s) 77,77,78

已通过安全项 Firebase远程配置已禁用

Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/541294567202/namespaces/firebase:fetch?key=AIzaSyBA_IF-94WZlMR7cdFwYBjyH1sGQ0k4TwA ) 已禁用。响应内容如下所示:

{
    "state": "NO_TEMPLATE"
}

重点安全关注 应用程序可能与位于OFAC制裁国家 (中国) 的服务器 (firebase-settings.crashlytics.com) 通信。

{'ip': '180.163.151.38', 'country_short': 'CN', 'country_long': '中国', 'region': '上海', 'city': '上海', 'latitude': '31.224333', 'longitude': '121.468948'}

重点安全关注 应用程序可能与位于OFAC制裁国家 (中国) 的服务器 (pagead2.googlesyndication.com) 通信。

{'ip': '180.163.151.38', 'country_short': 'CN', 'country_long': '中国', 'region': '上海', 'city': '上海', 'latitude': '31.224333', 'longitude': '121.468948'}

综合安全基线评分总结

应用图标

Playback Mic Pro v121

Android APK
47
综合安全评分
中风险