导航菜单

应用安全检测报告

应用安全检测报告,支持文件搜索、内容检索和AI代码分析

移动应用安全检测报告

应用图标

CashVia v1.6.02

Android APK f4bef292...
55
安全评分

安全基线评分

55/100

低风险

综合风险等级

风险等级评定
  1. A
  2. B
  3. C
  4. F

应用存在一定安全风险,建议优化

漏洞与安全项分布

2 高危
16 中危
2 信息
3 安全

隐私风险评估

4
第三方跟踪器

中等隐私风险
检测到少量第三方跟踪器


检测结果分布

高危安全漏洞 2
中危安全漏洞 16
安全提示信息 2
已通过安全项 3
重点安全关注 0

高危安全漏洞 应用程序在加密算法中使用ECB模式。ECB模式是已知的弱模式,因为它对相同的明文块[UNK]产生相同的密文

应用程序在加密算法中使用ECB模式。ECB模式是已知的弱模式,因为它对相同的明文块[UNK]产生相同的密文
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-block-cipher-mode

Files:
u2/q.java, line(s) 62

高危安全漏洞 该文件是World Readable。任何应用程序都可以读取文件

该文件是World Readable。任何应用程序都可以读取文件
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#testing-local-storage-for-sensitive-data-mstg-storage-1-and-mstg-storage-2

Files:
com/datavisorobfus/k0.java, line(s) 29

中危安全漏洞 应用数据允许备份

[android:allowBackup=true]
该标志允许通过 adb 工具备份应用数据。启用 USB 调试的用户可直接复制应用数据,存在数据泄露风险。

中危安全漏洞 Broadcast Receiver (com.xy.release.SmsAutoFileReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.gms.auth.api.phone.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (com.google.android.gms.auth.api.signin.RevocationBoundService) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.profileinstaller.ProfileInstallReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据

应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage

Files:
K/C0327d.java, line(s) 219,227
K/C0525d.java, line(s) 719,727
com/datavisor/vangogh/storage/local/a.java, line(s) 104
com/datavisor/vangogh/storage/local/b.java, line(s) 13,15
com/datavisorobfus/i.java, line(s) 1452
com/datavisorobfus/l.java, line(s) 188
com/datavisorobfus/p.java, line(s) 291
com/xy/credyclub/repository/risk/info/InfoStorage.java, line(s) 67,68

中危安全漏洞 应用程序使用不安全的随机数生成器

应用程序使用不安全的随机数生成器
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-random-number-generators

Files:
K1/e.java, line(s) 9
N1/C0206b.java, line(s) 18
N1/C0560b.java, line(s) 19
X0/b.java, line(s) 3
a3d20241011/o0oOOOOOooooo.java, line(s) 26
com/appsflyer/internal/AFb1gSDK.java, line(s) 20
com/datavisor/vangogh/util/ExceptionUtil.java, line(s) 7
com/datavisorobfus/o.java, line(s) 10
d1/w1.java, line(s) 43
t3/y.java, line(s) 3

中危安全漏洞 MD5是已知存在哈希冲突的弱哈希

MD5是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
K/AbstractC0524c.java, line(s) 113
d1/w1.java, line(s) 74

中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库

应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2

Files:
A2/C0011a.java, line(s) 10,263,275,298
A2/C0026a.java, line(s) 17,665,677,700
Q0/h.java, line(s) 4,56
Q0/i.java, line(s) 4,29
R0/k.java, line(s) 3,12,13,14,15,16,19,20,21,24,27,28,29,32,33,34,35,36,39,42,43,44
R0/l.java, line(s) 5,6,46
d1/AbstractC0242u0.java, line(s) 6,7,71
d1/AbstractC0392u0.java, line(s) 6,7,72
d1/C0214g.java, line(s) 6,7,106,669,939
d1/C0345B.java, line(s) 5,6,7,8,80
d1/C0364g.java, line(s) 6,7,120,161,1114,2001,2321,2361

中危安全漏洞 SHA-1是已知存在哈希冲突的弱哈希

SHA-1是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
X1/g.java, line(s) 116
com/datavisorobfus/e0.java, line(s) 26
com/datavisorobfus/l0.java, line(s) 11,30,47
r1/c.java, line(s) 48

中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等

文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10

Files:
coil/memory/MemoryCache$Key.java, line(s) 54
com/datavisor/vangogh/face/DVKeyName.java, line(s) 4,5

中危安全漏洞 IP地址泄露

IP地址泄露


Files:
com/datavisor/vangogh/util/ExceptionUtil.java, line(s) 63
com/datavisorobfus/g.java, line(s) 19
com/datavisorobfus/o.java, line(s) 100

中危安全漏洞 不安全的Web视图实现。可能存在WebView任意代码执行漏洞

不安全的Web视图实现。可能存在WebView任意代码执行漏洞
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#testing-javascript-execution-in-webviews-mstg-platform-5

Files:
com/datavisorobfus/h.java, line(s) 59,58
com/datavisorobfus/l.java, line(s) 254,253

中危安全漏洞 应用程序创建临时文件。敏感信息永远不应该被写进临时文件

应用程序创建临时文件。敏感信息永远不应该被写进临时文件


Files:
T/d.java, line(s) 248
com/xy/credyclub/view/inbasic/BasicThirdFragment.java, line(s) 377

中危安全漏洞 此应用程序可能会请求root(超级用户)权限

此应用程序可能会请求root(超级用户)权限
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
com/datavisorobfus/c.java, line(s) 94

中危安全漏洞 应用程序包含隐私跟踪程序

此应用程序有多个4隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。

中危安全漏洞 此应用可能包含硬编码机密信息

从应用程序中识别出以下机密确保这些不是机密或私人信息
"com.google.firebase.crashlytics.mapping_file_id" : "603a826298a743769f99c0011cb2fb9c"
"google_api_key" : "AIzaSyBmYnDJtf6ZmJs6WCHuCymaeBU0BnwKzew"
"google_app_id" : "1:1048986715349:android:5223ad223b157d834fce5c"
"google_crash_reporting_api_key" : "AIzaSyBmYnDJtf6ZmJs6WCHuCymaeBU0BnwKzew"
"local_key" : "6LJHsi98e4"
470fa2b4ae81cd56ecbcda9735803434cec591fa
E3F9E1E0CF99D0E56A055BA65E241B3399F7CEA524326B0CDD6EC1327ED0FDC1
dI2H2mzZqo8OQIQxI/oZ8itF3Lf7XC57dQ==
MJCR3nbjtc8ARKt9HOAI/AZAzrHiEyhubQ==
H6ik7UfoqtAwYIZxE9A68jVW8J/oAjw=
3BAF59A2E5331C30675FAB35FF5FFF0D116142D3D4664F1C3CB804068B40614F
FBA3AF4E7757D9016E953FB3EE4671CA2BD9AF725F9A53D52ED4A38EAAA08901
KZGR3Uffq88OW6tuEewC9j5V3A==
FFE391E0EA186D0734ED601E4E70E3224B7309D48E2075BAC46D8C667EAE7212
MJCR3nbjtc8ARKt/AP825zhTxLPuFzw=

安全提示信息 应用程序记录日志信息,不得记录敏感信息

应用程序记录日志信息,不得记录敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs

Files:
A/AbstractC0023a.java, line(s) 104,252,111,258,103,110
A/AbstractC0146a.java, line(s) 105,267,112,273,104,111
A2/C0011a.java, line(s) 149,169,168
A2/C0026a.java, line(s) 184,204,258,261,281,296,304,315,502,518,441,442,443,444,445,446,447,448,449,450,451,452,453,454,455,456,457,458,459,507,573,203,244,279,295,303,314,337,433,501,517,557,338,434
A2/C0125c.java, line(s) 30
A2/C0129g.java, line(s) 30
A2/C0149b.java, line(s) 62,88
A2/C0150c.java, line(s) 31
A2/C0151d.java, line(s) 170,195,151
A2/C0154g.java, line(s) 31
C1/c.java, line(s) 111
C1/e.java, line(s) 81,162,86,80,161
E0/b.java, line(s) 45,38,51,56
E0/g.java, line(s) 358,377,364,367,389,357,376,400,401
E0/j.java, line(s) 47,72
E1/d.java, line(s) 26,56,49,25,42,52,55,43,53
F0/d.java, line(s) 29
F0/e.java, line(s) 54,87,94
F0/h.java, line(s) 35
F0/i.java, line(s) 194,196,98,120,124,191,48
F0/l.java, line(s) 63
F0/o.java, line(s) 105,109,40
H0/d.java, line(s) 30
H0/e.java, line(s) 303,411
H0/g.java, line(s) 56,55
H0/s.java, line(s) 84,88
H0/v.java, line(s) 43,67
H1/e.java, line(s) 25,57,58
J0/AbstractC0019e.java, line(s) 305,202,208,214,223,333
J0/AbstractC0072e.java, line(s) 305,202,208,214,223,333
J0/C.java, line(s) 48
J0/j.java, line(s) 33,36,39,42,45,48,59,62,65,68,98,103
J0/k.java, line(s) 33
J0/v.java, line(s) 38
J0/x.java, line(s) 39,54
J0/z.java, line(s) 40,45
L1/RunnableC0533a.java, line(s) 362,381,397
M1/C0194e.java, line(s) 18
M1/C0196g.java, line(s) 212,230,61,65,71,74,141
M1/C0547e.java, line(s) 20
M1/C0549g.java, line(s) 223,241,72,76,82,85,152
N2/n.java, line(s) 132,105,104,131
Q0/b.java, line(s) 70,89
Q0/c.java, line(s) 101,100
Q1/b.java, line(s) 32
Q1/e.java, line(s) 163,351
R0/b.java, line(s) 127,126,120
T/c.java, line(s) 176,184,204,225,175,179,192,180,193,360,373
T/d.java, line(s) 223,414,345,346
U0/f.java, line(s) 58,64,238,294,319,289,61,88,147,183,198,206,216
U0/g.java, line(s) 33
U1/C0281a.java, line(s) 38,39
U1/C0659a.java, line(s) 41,42
U1/b.java, line(s) 87,82,123,129
V2/C0286a.java, line(s) 60
V2/C0667a.java, line(s) 62
W/b.java, line(s) 20,30
W1/C0303b.java, line(s) 10,9
W1/C0690b.java, line(s) 10,9
W1/c.java, line(s) 59,168,58,100
X1/g.java, line(s) 48,120
X1/h.java, line(s) 28,34
X1/i.java, line(s) 32
X1/j.java, line(s) 54,61,62,171
X1/m.java, line(s) 90,250,271,289,372,329,345,89,111,249,270,288,319,324,347,361,371,112,320,325,362,285,295,316,350
X1/o.java, line(s) 32,44,45,28
X1/p.java, line(s) 83,107,91,112,114,116,68,82,106,69,77
X1/r.java, line(s) 35,24,28,34
X1/u.java, line(s) 27,35,42,26,34,41
X1/w.java, line(s) 39,40
X1/z.java, line(s) 194,59,193,60,157
Y1/A.java, line(s) 34
Y1/C0104m.java, line(s) 22,29
Y1/C0114x.java, line(s) 30
Y1/C0126l.java, line(s) 82,102,155,119,108,117
Y1/C0127m.java, line(s) 24,31
Y1/C0131q.java, line(s) 44
Y1/C0137x.java, line(s) 31
Y1/C0319d.java, line(s) 32,60
Y1/C0322g.java, line(s) 138,165,76,137,164,54,67,98,144,194,231,266
Y1/C0327l.java, line(s) 26,62
Y1/C0713d.java, line(s) 35,63
Y1/C0716g.java, line(s) 140,167,78,139,166,56,69,100,146,196,233,268
Y1/C0721l.java, line(s) 30,54,97
Y1/F.java, line(s) 59
Y1/S.java, line(s) 58,67,57
Y1/T.java, line(s) 53,45
Y1/V.java, line(s) 61,73,89,79
Y1/W.java, line(s) 29,49
Y1/X.java, line(s) 36,57,62,97,100
com/appsflyer/internal/AFf1cSDK.java, line(s) 145
com/appsflyer/internal/AFf1fSDK.java, line(s) 135
com/appsflyer/internal/AFf1uSDK.java, line(s) 66,71,117,123
com/appsflyer/internal/AFg1dSDK.java, line(s) 39,85,54,43,49,47
com/xy/credyclub/MineApp.java, line(s) 162
d1/C0241u.java, line(s) 143,142
d1/C0243v.java, line(s) 168
d1/C0391u.java, line(s) 147,146
d1/C0393v.java, line(s) 175
d1/G.java, line(s) 233
d1/u1.java, line(s) 77
d1/w1.java, line(s) 875
m0/a.java, line(s) 136
o3/d.java, line(s) 33
r1/c.java, line(s) 41,52
r1/e.java, line(s) 67
s1/c.java, line(s) 78,79
t1/a.java, line(s) 51,50,55
u2/z.java, line(s) 49
w0/a.java, line(s) 110,211
w0/b.java, line(s) 37,52,60,69

安全提示信息 此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它

此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard

Files:
X2/C0312a.java, line(s) 5,76,89
X2/C0703a.java, line(s) 5,77,90

已通过安全项 此应用程序可能具有Root检测功能

此应用程序可能具有Root检测功能
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
K/C0327d.java, line(s) 158,158,158,158
K/C0525d.java, line(s) 658,658,658,658
X1/g.java, line(s) 107,107,108

已通过安全项 此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击

此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#testing-custom-certificate-stores-and-certificate-pinning-mstg-network-4

Files:
j2/e.java, line(s) 63,66,69,39
n3/e.java, line(s) 71,70,69
n3/h.java, line(s) 84,74,83,91,82,82
n3/m.java, line(s) 72,71,70,70
n3/n.java, line(s) 117,105,116,115,115

已通过安全项 Firebase远程配置已禁用

Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/1048986715349/namespaces/firebase:fetch?key=AIzaSyBmYnDJtf6ZmJs6WCHuCymaeBU0BnwKzew ) 已禁用。响应内容如下所示:

{
    "state": "NO_TEMPLATE"
}

综合安全基线评分总结

应用图标

CashVia v1.6.02

Android APK
55
综合安全评分
中风险