Info Call to dynamic code loading API


List of all dynamic code loading API calls in the application. Loading code from untrsuted sources could allow the execution of malicious code in the context of the current application.


This entry is informative, no recommendations applicable.

Technical details

Method okhttp3.internal.huc.OkHttpURLConnection.defaultUserAgent() calling method java.lang.System.getProperty()

    private String defaultUserAgent()
        String v1_1;
        String v0 = System.getProperty("http.agent");
        if (v0 == null) {
            v1_1 = okhttp3.internal.Version.userAgent();
        } else {
            v1_1 = okhttp3.internal.huc.OkHttpURLConnection.toHumanReadableAscii(v0);
        return v1_1;

Method okhttp3.internal.platform.Platform.isConscryptPreferred() calling method java.lang.System.getProperty()

    public static boolean isConscryptPreferred()
        boolean v1_3;
        if (!"conscrypt".equals(System.getProperty("okhttp.platform"))) {
            v1_3 = "Conscrypt".equals([0].getName());
        } else {
            v1_3 = 1;
        return v1_3;

Method<init>() calling method dalvik.system.PathClassLoader.<init>()

    zzh(String p1, ClassLoader p2)
        super(p1, p2);