应用安全检测报告
应用安全检测报告,支持文件搜索、内容检索和AI代码分析
移动应用安全检测报告

aeroLINE CREW v5.0.1
56
安全评分
安全基线评分
56/100
低风险
综合风险等级
风险等级评定
- A
- B
- C
- F
应用存在一定安全风险,建议优化
漏洞与安全项分布
2
高危
12
中危
1
信息
3
安全
隐私风险评估
2
第三方跟踪器
中等隐私风险
检测到少量第三方跟踪器
检测结果分布
高危安全漏洞
2
中危安全漏洞
12
安全提示信息
1
已通过安全项
3
重点安全关注
0
高危安全漏洞 如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击
如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-7 Files: com/reactnativecommunity/webview/RNCWebViewManager.java, line(s) 510,31,32
高危安全漏洞 应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。
应用程序使用带PKCS5/PKCS7填充的加密模式CBC。此配置容易受到填充oracle攻击。 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4 Files: com/tectiv3/aes/RCTAes.java, line(s) 159,169
中危安全漏洞 应用已启用明文网络流量
[android:usesCleartextTraffic=true] 应用允许明文网络流量(如 HTTP、FTP 协议、DownloadManager、MediaPlayer 等)。API 级别 27 及以下默认启用,28 及以上默认禁用。明文流量缺乏机密性、完整性和真实性保护,攻击者可窃听或篡改传输数据。建议关闭明文流量,仅使用加密协议。
中危安全漏洞 Broadcast Receiver (io.invertase.firebase.messaging.ReactNativeFirebaseMessagingReceiver) 受权限保护,但应检查权限保护级别。
Permission: com.google.android.c2dm.permission.SEND [android:exported=true] 检测到 Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。
中危安全漏洞 Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) 受权限保护,但应检查权限保护级别。
Permission: com.google.android.c2dm.permission.SEND [android:exported=true] 检测到 Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。
中危安全漏洞 Service (androidx.work.impl.background.systemjob.SystemJobService) 受权限保护,但应检查权限保护级别。
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true] 检测到 Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。
中危安全漏洞 Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) 受权限保护,但应检查权限保护级别。
Permission: android.permission.DUMP [android:exported=true] 检测到 Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。
中危安全漏洞 Service (com.google.android.gms.auth.api.signin.RevocationBoundService) 受权限保护,但应检查权限保护级别。
Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true] 检测到 Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。
中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
文件可能包含硬编码的敏感信息,如用户名、密码、密钥等 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10 Files: com/oblador/keychain/KeychainModule.java, line(s) 46,83,88 io/invertase/firebase/common/TaskExecutorService.java, line(s) 14,15 io/invertase/firebase/messaging/ReactNativeFirebaseMessagingHeadlessService.java, line(s) 13,11 io/invertase/firebase/messaging/ReactNativeFirebaseMessagingSerializer.java, line(s) 20 net/time4j/tz/spi/WinZoneProviderSPI.java, line(s) 26
中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage Files: com/RNFetchBlob/RNFetchBlobFS.java, line(s) 179,201,171,172,173,174,175,176,177,178,191,192,199,632 com/RNFetchBlob/Utils/PathResolver.java, line(s) 26 com/learnium/RNDeviceInfo/RNDeviceModule.java, line(s) 366 com/rnfs/RNFSManager.java, line(s) 932,840,921,923,926 io/invertase/firebase/utils/ReactNativeFirebaseUtilsModule.java, line(s) 114,125,126,127
中危安全漏洞 MD5是已知存在哈希冲突的弱哈希
MD5是已知存在哈希冲突的弱哈希 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4 Files: com/RNFetchBlob/RNFetchBlobUtils.java, line(s) 23
中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2 Files: com/reactnativecommunity/asyncstorage/ReactDatabaseSupplier.java, line(s) 4,5,6,42
中危安全漏洞 应用程序包含隐私跟踪程序
此应用程序有多个2隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。
中危安全漏洞 此应用可能包含硬编码机密信息
从应用程序中识别出以下机密确保这些不是机密或私人信息 "google_api_key" : "AIzaSyANdVJuZhgIp0J6d911ZhSyTmFGck2LbhU" "google_app_id" : "1:772560439909:android:9b5e99a5143c48911c948c" "google_crash_reporting_api_key" : "AIzaSyANdVJuZhgIp0J6d911ZhSyTmFGck2LbhU"
安全提示信息 应用程序记录日志信息,不得记录敏感信息
应用程序记录日志信息,不得记录敏感信息 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs Files: br/com/classapp/RNSensitiveInfo/RNSensitiveInfoModule.java, line(s) 56,127,229 cl/json/RNShareModule.java, line(s) 235,239,247,258,263,277,292 cl/json/RNSharePathUtil.java, line(s) 48 cl/json/social/InstagramShare.java, line(s) 39,48 cl/json/social/SingleShareIntent.java, line(s) 27,30,39 com/RNFetchBlob/RNFetchBlobReq.java, line(s) 360 com/calendarevents/RNCalendarEvents.java, line(s) 428,625,108,112 com/henninghall/date_picker/DerivedData.java, line(s) 76 com/henninghall/date_picker/pickers/AndroidNative.java, line(s) 80,82,84 com/horcrux/svg/Brush.java, line(s) 140,150 com/horcrux/svg/ClipPathView.java, line(s) 33 com/horcrux/svg/ImageView.java, line(s) 139 com/horcrux/svg/LinearGradientView.java, line(s) 77 com/horcrux/svg/MaskView.java, line(s) 82 com/horcrux/svg/PatternView.java, line(s) 89 com/horcrux/svg/RadialGradientView.java, line(s) 91 com/horcrux/svg/UseView.java, line(s) 58,89,104 com/horcrux/svg/VirtualView.java, line(s) 370,301,335,339 com/imagepicker/ImageMetadata.java, line(s) 26 com/imagepicker/Metadata.java, line(s) 31 com/imagepicker/VideoMetadata.java, line(s) 40,72 com/learnium/RNDeviceInfo/RNDeviceModule.java, line(s) 212,292,401,406,522,557,650,833,912,916 com/learnium/RNDeviceInfo/RNInstallReferrerClient.java, line(s) 73,79,84,97,27,43,91 com/learnium/RNDeviceInfo/resolver/DeviceIdResolver.java, line(s) 20,23,24,28 com/oblador/keychain/KeychainModule.java, line(s) 444,456,138,162,165,168,189,202,205,208,256,259,274,314,317,131,136,410,507 com/oblador/keychain/cipherStorage/CipherStorageBase.java, line(s) 241,296,271,288,417 com/oblador/keychain/cipherStorage/CipherStorageFacebookConceal.java, line(s) 87 com/oblador/keychain/cipherStorage/CipherStorageKeystoreAesCbc.java, line(s) 134 com/oblador/keychain/cipherStorage/CipherStorageKeystoreRsaEcb.java, line(s) 120 com/oblador/keychain/decryptionHandler/DecryptionResultHandlerInteractiveBiometric.java, line(s) 110,117 com/oblador/keychain/decryptionHandler/DecryptionResultHandlerInteractiveBiometricManualRetry.java, line(s) 20,48,79 com/reactcommunity/rndatetimepicker/MinuteIntervalSnappableTimePickerDialog.java, line(s) 104 com/reactnativecommunity/asyncstorage/AsyncStorageModule.java, line(s) 154,193,207,221,239,244,249,284,289,309,337,351,365,379,390,395,411,429,459 com/reactnativecommunity/asyncstorage/ReactDatabaseSupplier.java, line(s) 89,92 com/reactnativecommunity/webview/RNCWebViewManager.java, line(s) 943,1016,189,202,932,948,975,1018 com/reactnativecommunity/webview/RNCWebViewModule.java, line(s) 300,305,329,334,217,241,255 com/swmansion/gesturehandler/react/RNGestureHandlerRootHelper.java, line(s) 36,50 com/swmansion/gesturehandler/react/RNGestureHandlerRootView.java, line(s) 35 com/swmansion/reanimated/nodes/DebugNode.java, line(s) 21 com/th3rdwave/safeareacontext/SafeAreaView.java, line(s) 74 com/vonovak/AddCalendarEventModule.java, line(s) 168,232,183,220 io/invertase/firebase/app/ReactNativeFirebaseApp.java, line(s) 16 io/invertase/firebase/common/RCTConvertFirebase.java, line(s) 109 io/invertase/firebase/common/ReactNativeFirebaseEventEmitter.java, line(s) 130 io/invertase/firebase/common/SharedUtils.java, line(s) 82,234,291,93 io/invertase/firebase/crashlytics/ReactNativeFirebaseCrashlyticsInitProvider.java, line(s) 20,23,26,28,39,42,45,47,58,61,64,66,78,75 io/invertase/firebase/crashlytics/ReactNativeFirebaseCrashlyticsModule.java, line(s) 53,56,71,145,154 io/invertase/firebase/messaging/ReactNativeFirebaseMessagingModule.java, line(s) 80 io/invertase/firebase/messaging/ReactNativeFirebaseMessagingReceiver.java, line(s) 21,42 io/invertase/firebase/utils/ReactNativeFirebaseUtilsModule.java, line(s) 71 net/time4j/android/ApplicationStarter.java, line(s) 106,55,59,85,101,102,103,104 net/time4j/base/ResourceLoader.java, line(s) 90,116 net/time4j/format/expert/ChronoFormatter.java, line(s) 500,541,590,594,1006,1033,1279,1285,563,588,591,950,953,1011,1026,1034,1148,1170,1176,1222,1303,1336 net/time4j/format/expert/CustomizedProcessor.java, line(s) 101,107 net/time4j/format/expert/FormatStep.java, line(s) 296 net/time4j/format/expert/IgnorableWhitespaceProcessor.java, line(s) 49 net/time4j/format/expert/Iso8601Format.java, line(s) 78,92 net/time4j/format/expert/LiteralProcessor.java, line(s) 113,152,294 net/time4j/format/expert/LocalizedGMTProcessor.java, line(s) 192,236,239,253,256,269,281,284,303,306,311,348,351 net/time4j/format/expert/LookupProcessor.java, line(s) 79,80,99,111,119 net/time4j/format/expert/MultiFormatParser.java, line(s) 37,50,65,35,48,54,63,69 net/time4j/format/expert/SkipProcessor.java, line(s) 75 net/time4j/format/expert/StyleProcessor.java, line(s) 79 net/time4j/format/expert/TextProcessor.java, line(s) 97,83,84,99,111,114 net/time4j/format/expert/TimezoneGenericProcessor.java, line(s) 121,143,184,189,192 net/time4j/format/expert/TimezoneIDProcessor.java, line(s) 44,59,63,68,73,78,94,100 net/time4j/format/expert/TimezoneNameProcessor.java, line(s) 116,142,213,230,232 net/time4j/i18n/WeekdataProviderSPI.java, line(s) 141 net/time4j/tz/spi/ZoneNameProviderSPI.java, line(s) 152
已通过安全项 此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击
此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#testing-custom-certificate-stores-and-certificate-pinning-mstg-network-4 Files: com/RNFetchBlob/RNFetchBlobReq.java, line(s) 345,344,351,343,343
已通过安全项 此应用程序具有防止窃听攻击的功能
此应用程序具有防止窃听攻击的功能 https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#testing-for-overlay-attacks-mstg-platform-9 Files: com/accelaero/aeroLINECREW/MainActivity.java, line(s) 15
已通过安全项 Firebase远程配置已禁用
Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/772560439909/namespaces/firebase:fetch?key=AIzaSyANdVJuZhgIp0J6d911ZhSyTmFGck2LbhU ) 已禁用。响应内容如下所示: { "state": "NO_TEMPLATE" }
综合安全基线评分总结

aeroLINE CREW v5.0.1
Android APK
56
综合安全评分
中风险