Info Call to dynamic code loading API

Description

List of all dynamic code loading API calls in the application. Loading code from untrsuted sources could allow the execution of malicious code in the context of the current application.

Recommendation

This entry is informative, no recommendations applicable.

Technical details

Method okhttp3.internal.huc.OkHttpURLConnection.defaultUserAgent() calling method java.lang.System.getProperty()


    private String defaultUserAgent()
    {
        String v1_1;
        String v0 = System.getProperty("http.agent");
        if (v0 == null) {
            v1_1 = okhttp3.internal.Version.userAgent();
        } else {
            v1_1 = okhttp3.internal.huc.OkHttpURLConnection.toHumanReadableAscii(v0);
        }
        return v1_1;
    }

Method okhttp3.internal.platform.Platform.isConscryptPreferred() calling method java.lang.System.getProperty()


    public static boolean isConscryptPreferred()
    {
        boolean v1_3;
        if (!"conscrypt".equals(System.getProperty("okhttp.platform"))) {
            v1_3 = "Conscrypt".equals(java.security.Security.getProviders()[0].getName());
        } else {
            v1_3 = 1;
        }
        return v1_3;
    }

Method com.google.android.gms.dynamite.zzh.<init>() calling method dalvik.system.PathClassLoader.<init>()


    zzh(String p1, ClassLoader p2)
    {
        super(p1, p2);
        return;
    }