Scan "Flutter Android App Test"

Application summary

Platform: android

Package: com.example.flutter_app

Version: 1.0.0

SHA1 Hash: e35ae3be12a9b422314d42e319a7f955d8cee417

Size: 9 MB

Scan summary

Icon

Date: Aug. 15, 2019, 11:03 a.m.

Vulnerability risk dashboard
Code coverage (% methods)

1570/1570 methods

Risk Title Short description
Medium Application code not obfuscated Application's source code is not obfuscated and could be decompiled to retrieve the initial source code
Medium ELF binaries do not enforce secure binary properties Application do not enforce binary protections (ASLR, NX, RELRO, Stack canaries)
Low Insecure Network Configuration Settings The application does not specify a network security configuration or sets insecure settings
Potentially Backup mode enabled Application is enabling backup mode
Important Exported activites, services and broadcast receivers list List of all exported components (activities, services, broadcast receivers, content providers)
Info Call to External Storage API List of external storage API calls
Info Call to Inter-Process-Communication (IPC) API List of Interp-Process Communication (IPC) calls
Info APK attack surface List of components potentially accepting user input
Info Call to logging API List of logging API calls
Info Application components list List application's components
Info Application certificate information Application signing certificate details
Info Call to dynamic code loading API List of dynamic code loading API calls
Info Call to Reflection API List of reflection API calls
Info Call to native methods List of native methods calls
Info List of JNI methods List of JNI methods defined in ELF files and used by the application
Info APK files list List of all files shipped in the application.
Info Android Manifest APK Manifest in XML
Info Obfuscated methods List of code obfuscation status of all application\s componenets