导航菜单

应用安全检测报告

应用安全检测报告,支持文件搜索、内容检索和AI代码分析

移动应用安全检测报告

应用图标

Swift Holidays v3.1

Android APK f7e8c509...
51
安全评分

安全基线评分

51/100

低风险

综合风险等级

风险等级评定
  1. A
  2. B
  3. C
  4. F

应用存在一定安全风险,建议优化

漏洞与安全项分布

2 高危
26 中危
2 信息
2 安全

隐私风险评估

4
第三方跟踪器

中等隐私风险
检测到少量第三方跟踪器


检测结果分布

高危安全漏洞 2
中危安全漏洞 26
安全提示信息 2
已通过安全项 2
重点安全关注 3

高危安全漏洞 已启用远程WebView调试

已启用远程WebView调试
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04c-Tampering-and-Reverse-Engineering.md#debugging-and-tracing

Files:
com/onesignal/s5.java, line(s) 49,8

高危安全漏洞 不安全的Web视图实现。Web视图忽略SSL证书错误并接受任何SSL证书。此应用程序易受MITM攻击

不安全的Web视图实现。Web视图忽略SSL证书错误并接受任何SSL证书。此应用程序易受MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#webview-server-certificate-verification

Files:
h3/i.java, line(s) 173,169

中危安全漏洞 应用已启用明文网络流量

[android:usesCleartextTraffic=true]
应用允许明文网络流量(如 HTTP、FTP 协议、DownloadManager、MediaPlayer 等)。API 级别 27 及以下默认启用,28 及以上默认禁用。明文流量缺乏机密性、完整性和真实性保护,攻击者可窃听或篡改传输数据。建议关闭明文流量,仅使用加密协议。

中危安全漏洞 应用数据允许备份

[android:allowBackup=true]
该标志允许通过 adb 工具备份应用数据。启用 USB 调试的用户可直接复制应用数据,存在数据泄露风险。

中危安全漏洞 Activity (com.android.advancedWebView.Activities.WebActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.onesignal.FCMBroadcastReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Activity (com.onesignal.NotificationOpenedActivityHMS) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.onesignal.NotificationDismissReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.onesignal.BootUpReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.onesignal.UpgradeReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.onesignal.NotificationOpenedReceiver) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.onesignal.NotificationOpenedReceiverAndroid22AndOlder) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (androidx.work.impl.background.systemjob.SystemJobService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.profileinstaller.ProfileInstallReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 高优先级 Intent(999) - {1} 个命中

[android:priority]
通过设置较高的 Intent 优先级,应用可覆盖其他请求,可能导致安全风险。

中危安全漏洞 应用程序使用不安全的随机数生成器

应用程序使用不安全的随机数生成器
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-random-number-generators

Files:
c5/n.java, line(s) 9
e3/f.java, line(s) 13
h/q0.java, line(s) 31
hd/a.java, line(s) 3
hd/b.java, line(s) 4
id/a.java, line(s) 3
l6/g5.java, line(s) 35
l6/m.java, line(s) 6
qb/c1.java, line(s) 16
qb/e1.java, line(s) 3
qb/r2.java, line(s) 12
rb/n.java, line(s) 14
xb/t.java, line(s) 13

中危安全漏洞 不安全的Web视图实现。可能存在WebView任意代码执行漏洞

不安全的Web视图实现。可能存在WebView任意代码执行漏洞
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#testing-javascript-execution-in-webviews-mstg-platform-5

Files:
com/onesignal/s5.java, line(s) 57,56

中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库

应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2

Files:
c8/b.java, line(s) 4,51
com/onesignal/e4.java, line(s) 6,7,8,9,10,419,420,385
g2/h.java, line(s) 5,25,41,42,54,55
h9/v.java, line(s) 6,237
l6/j.java, line(s) 5,6,113,165,829
r4/d.java, line(s) 7,72
r4/i.java, line(s) 4,25
rd/p.java, line(s) 10,199,208
s4/e.java, line(s) 4,29
s4/h.java, line(s) 4,22
s4/n.java, line(s) 4,5,71
v1/b.java, line(s) 4,34
z5/a.java, line(s) 10,11,266

中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等

文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10

Files:
com/onesignal/d5.java, line(s) 249
o3/i.java, line(s) 42
q3/f.java, line(s) 37
q3/g0.java, line(s) 88
q3/y.java, line(s) 83
rb/k.java, line(s) 133
v9/b.java, line(s) 36

中危安全漏洞 SHA-1是已知存在哈希冲突的弱哈希

SHA-1是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
e3/f.java, line(s) 72,77,80,83
n8/e.java, line(s) 934
y9/b.java, line(s) 51

中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据

应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage

Files:
a/j.java, line(s) 63
f2/p.java, line(s) 118
ud/b.java, line(s) 27
ud/e.java, line(s) 159
ud/f.java, line(s) 32

中危安全漏洞 MD5是已知存在哈希冲突的弱哈希

MD5是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
c5/n.java, line(s) 35
l6/g5.java, line(s) 136

中危安全漏洞 应用程序创建临时文件。敏感信息永远不应该被写进临时文件

应用程序创建临时文件。敏感信息永远不应该被写进临时文件


Files:
a/j.java, line(s) 63
g1/d.java, line(s) 98
h/q0.java, line(s) 139
l6/w2.java, line(s) 208
q1/p.java, line(s) 60

中危安全漏洞 可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息

可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-6

Files:
a/j.java, line(s) 179,172

中危安全漏洞 应用程序包含隐私跟踪程序

此应用程序有多个4隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。

中危安全漏洞 此应用可能包含硬编码机密信息

从应用程序中识别出以下机密确保这些不是机密或私人信息
AdMob广告平台的=> "com.google.android.gms.ads.APPLICATION_ID" : "@7F130000"
"ADMOB_APP_ID" : "ca-app-pub-3940256099942544~3347511713"
"autoHideToolbarPrefKey" : "autoHideToolbar"
"blockAdsPrefKey" : "blockAds"
"com.google.firebase.crashlytics.mapping_file_id" : "4834b97fa59b42e2b206cc5af0c2f442"
"darkthemePrefKey" : "darktheme"
"fullscreenPrefKey" : "fullscreen"
"geolocationPrefKey" : "geolocation"
"google_api_key" : "AIzaSyAon8ua0WCQX905ds7XIOC-qqkjtgmSm9E"
"google_app_id" : "1:825719518336:android:0c112e8007fd0cb209a265"
"google_crash_reporting_api_key" : "AIzaSyAon8ua0WCQX905ds7XIOC-qqkjtgmSm9E"
"hideBottomBarPrefKey" : "hideBottomBar"
"hideToolbarPrefKey" : "hideToolbar"
"immersive_modePrefKey" : "immersive_mode"
"library_zxingandroidembedded_author" : "JourneyApps"
"library_zxingandroidembedded_authorWebsite" : "https://journeyapps.com/"
"loadLastUrlPrefKey" : "loadLastUrl"
"nativeLoadPrefKey" : "nativeLoad"
"nightModeKeyPrefKey" : "nightModeKey"
"permission_queryPrefKey" : "permission_query"
"swipeRefreshKeyPrefKey" : "swipeRefreshKey"
B3EEABB8EE11C2BE770B684D95219ECB
470fa2b4ae81cd56ecbcda9735803434cec591fa
b2f7f966-d8cc-11e4-bed1-df8f05be55ba
c682b8144a8dd52bc1ad63
cfcfc6f5-6abc-4e76-891d-faaa196fd555
5eb5a37e-b458-11e3-ac11-000c2940e62c

安全提示信息 应用程序记录日志信息,不得记录敏感信息

应用程序记录日志信息,不得记录敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs

Files:
a/b.java, line(s) 143,407,413,393
a/d.java, line(s) 47,56,61,69
a/e.java, line(s) 62
a/f.java, line(s) 71
a/j.java, line(s) 64,161
a1/c.java, line(s) 139
a1/g.java, line(s) 190,295,301,363,444,465,528,542,590,656,695,698,725,760,844,47,215,349,804,817
a5/b.java, line(s) 94,137,230
a8/b.java, line(s) 1198,599,1197,1191
a8/e.java, line(s) 19
a8/g.java, line(s) 133,157,63
b0/f.java, line(s) 29,30
b3/c.java, line(s) 326
b4/c.java, line(s) 34,60,35,61
b4/i.java, line(s) 50,51
b4/j.java, line(s) 192,193,204
b4/m.java, line(s) 95,102,96,103
b6/d.java, line(s) 91,76
b6/f.java, line(s) 57,63,117,142,112,60
ba/a0.java, line(s) 21,20,20
ba/b0.java, line(s) 50,101,49,95,114,127,144
ba/d0.java, line(s) 22,21
ba/f.java, line(s) 21,24
ba/f0.java, line(s) 39,43,51,60,74,102,124,82,87,110,38,42,50,59,71,101,123
ba/h.java, line(s) 53,52
ba/j.java, line(s) 25,24
ba/n.java, line(s) 51,25,28,40,50,41
ba/u.java, line(s) 138,155,137,154
ba/v.java, line(s) 33,49
ba/w.java, line(s) 22
ba/z.java, line(s) 68,68
c3/n.java, line(s) 187,186
c4/c.java, line(s) 322
c5/e2.java, line(s) 55,54
c8/b.java, line(s) 171,174
com/journeyapps/barcodescanner/BarcodeView.java, line(s) 51
com/onesignal/JobIntentService$JobServiceEngineImpl.java, line(s) 37,42,87
com/onesignal/p3.java, line(s) 590
com/onesignal/y3.java, line(s) 492,498,514,494,490,496
d0/b0.java, line(s) 47,78,84,107,210,220,242,250,43,77,83,106,209,219,241,249,62,87,120,199
d1/a.java, line(s) 28
d4/g.java, line(s) 389,25,240,270
d5/k.java, line(s) 56
d6/f.java, line(s) 32
da/c.java, line(s) 103,109,115,450,461
e0/i.java, line(s) 67
e3/b.java, line(s) 20,30
e4/g.java, line(s) 39,40
e5/b0.java, line(s) 33,32,46,47
e5/e0.java, line(s) 54,62,64,73,80,88,90,99,106,114,116,161,16,24,26,35,126,134,136,145
f2/g.java, line(s) 58,63,72,78,84,93,100
f2/p.java, line(s) 188,190,198,200,208,210,218,220
f9/d.java, line(s) 160,182
fb/d.java, line(s) 19
fb/e.java, line(s) 33
fb/g.java, line(s) 122,188,124
fb/h.java, line(s) 23
g0/f.java, line(s) 43,48
g0/g.java, line(s) 27
g0/h.java, line(s) 59
g0/i.java, line(s) 43
g0/j.java, line(s) 48,105
g1/a.java, line(s) 131,28,35,37,43,31,39,45,95
g1/d.java, line(s) 39,50,52,99,120,171,209,211,225,270,316,328,332,336,92,206,213,239,249,274,293,326
g2/k.java, line(s) 114,183,176,180,113,163,169,182,164,170
g7/i.java, line(s) 37
ga/l.java, line(s) 413
gb/b.java, line(s) 40,60,73
gb/c.java, line(s) 20,21,25,30,44,46
gb/d.java, line(s) 27
gb/e.java, line(s) 28,43,72,95,36,65,89,119
gb/g.java, line(s) 26,50
gb/h.java, line(s) 217,80,93,137,138,161,184,188,191,77,82
gb/k.java, line(s) 25
gb/m.java, line(s) 25
h/f0.java, line(s) 82
h/g0.java, line(s) 59,113,274,58,58,112,270,270
h/k0.java, line(s) 482,963,965,968,567,660,663
h/p.java, line(s) 385
h/q0.java, line(s) 220,145
h/u.java, line(s) 39
h0/d.java, line(s) 19,22,25
h0/k.java, line(s) 26,58,116
h1/f0.java, line(s) 30
h1/v.java, line(s) 194
h7/e.java, line(s) 449
h8/e.java, line(s) 32
h8/i.java, line(s) 66
h9/v.java, line(s) 64,383,63,87,88,117,118,382,355,400,440
j1/a.java, line(s) 223
j7/d.java, line(s) 95,129
j8/a.java, line(s) 33,32,37
k0/l.java, line(s) 22
k1/d.java, line(s) 28
k3/r.java, line(s) 34,38,8,43
k5/d.java, line(s) 334,333,309
k7/d.java, line(s) 34
k8/c.java, line(s) 42,43
l/j.java, line(s) 85,121,133,143
l/k.java, line(s) 152
l0/a.java, line(s) 54
l3/e.java, line(s) 99,87,116
l3/i.java, line(s) 184,192,197
l6/g2.java, line(s) 176
l6/w2.java, line(s) 97,372,175,176,382,386
l8/c.java, line(s) 46
l9/i.java, line(s) 127,122,126
la/c.java, line(s) 9
la/d.java, line(s) 40
m/i.java, line(s) 438
m0/e.java, line(s) 30
m3/d.java, line(s) 86,117,174,183,87,175,118,184
m3/e.java, line(s) 73
m6/a.java, line(s) 39,77,92,91,50,71
m7/e.java, line(s) 114,145,200,134,198,113,133
m7/g.java, line(s) 131
m8/b.java, line(s) 10,9
n2/d.java, line(s) 148
n3/d.java, line(s) 177,204,174,203
n3/e.java, line(s) 101,121,138,100,120,137
n8/e.java, line(s) 518,883,938,742,880
n8/h.java, line(s) 51,58,59,123
n8/j.java, line(s) 99,231,261,289,347,325,98,122,230,260,288,315,320,336,346,123,316,321,337,285,295,312
n8/m.java, line(s) 68,73,55,67,56,63
n8/o.java, line(s) 39,28,32,38
n8/q.java, line(s) 30,38,44,29,37,43
n8/r.java, line(s) 49,50
n8/u.java, line(s) 48,49,129
n8/v.java, line(s) 518,419,420
nd/r.java, line(s) 198,212,222
o0/c.java, line(s) 80
o0/j0.java, line(s) 74
o0/p.java, line(s) 31,44,91,153,192,209,233
o0/q1.java, line(s) 31
o0/r1.java, line(s) 32,44,51,60
o0/v0.java, line(s) 307,221,306
o0/v1.java, line(s) 77,93,68
o0/y0.java, line(s) 20,31
o6/a.java, line(s) 111,115,137,166
o8/b.java, line(s) 32,31
o8/h.java, line(s) 34,64
p2/f.java, line(s) 233,386,391,232,385
p3/c.java, line(s) 64,63
p5/b.java, line(s) 82,99,81,98,121
p5/c.java, line(s) 46,62,97,45,61,96,58,91,114
p5/d.java, line(s) 15,12,12
p5/g.java, line(s) 42,41,55,74,100,120,129,56,75,101,121,130
p5/i.java, line(s) 24,31,23,30
p5/k.java, line(s) 257,256
p6/a.java, line(s) 94,173,105,190
q1/g.java, line(s) 77,171
q1/k.java, line(s) 24,36
q1/l.java, line(s) 63
q1/p.java, line(s) 141,144,149
q3/a0.java, line(s) 88
q3/i0.java, line(s) 52,53
q3/m.java, line(s) 467,117,171,466,295
q3/n.java, line(s) 143,144
q3/q.java, line(s) 12,47
q4/b.java, line(s) 95,94
q5/e.java, line(s) 53,142,149
q5/f.java, line(s) 29
q5/j.java, line(s) 34
q5/k.java, line(s) 48
q5/m.java, line(s) 26
q5/p.java, line(s) 45
q5/t.java, line(s) 77,81,37,60
q5/w.java, line(s) 36,39,53
r3/h.java, line(s) 65,145,66,146
r3/i.java, line(s) 110,131,153,173,73,76,82,109,130,141,144,152,162,172,175,74,83,92,142,163
r4/d.java, line(s) 101,100
rd/p.java, line(s) 354,426
s0/u.java, line(s) 16,15
s2/f.java, line(s) 60,90,99,81,84,102,108,111,59,89
s5/b0.java, line(s) 297,289,290,291,315,316
s5/c0.java, line(s) 41,61
s5/e0.java, line(s) 93
s5/f.java, line(s) 18
s5/h.java, line(s) 220,421
s5/l0.java, line(s) 210,261
s5/s.java, line(s) 104,209
s5/w0.java, line(s) 38
s5/x.java, line(s) 42
s6/b.java, line(s) 35
s8/c.java, line(s) 167
sd/a.java, line(s) 553,566,552,570,571
t3/b.java, line(s) 78,95,106,117
t5/f.java, line(s) 167,198,349,353,358,367
t5/j.java, line(s) 66
t5/m0.java, line(s) 47
t5/p0.java, line(s) 41,46
t5/t.java, line(s) 79,82,108,111,114,153,158
t5/w.java, line(s) 16
t5/y.java, line(s) 36,47
u/d.java, line(s) 248
u3/f.java, line(s) 52,51
u3/h.java, line(s) 100,99
u3/x.java, line(s) 70,71
u3/z.java, line(s) 278,242,230,277,231
u8/a.java, line(s) 464,485,473,474,284,297,323,327,368,382,391,425
ud/a.java, line(s) 59,94,98,115
ud/c.java, line(s) 24,33,54
ud/e.java, line(s) 125
v0/d.java, line(s) 284
w3/b.java, line(s) 68,69
w5/a.java, line(s) 71,88
wb/a.java, line(s) 1313,1330,1324,1312,1329,1335,1336,130,1297,1305,1321
x3/c.java, line(s) 30,31
x3/i.java, line(s) 21,26,22,29
x3/l.java, line(s) 70,80,94,106,128,136,163,190,197,242,69,79,91,105,127,135,158,169,179,184,188,192,232,237
x3/u.java, line(s) 58,64,70,76,82,89,95,109,118,59,65,71,77,83,90,96,119,110
x3/x.java, line(s) 42,51,58,43,52,59,60,61,64
x5/d.java, line(s) 59,66,96,105
x8/a.java, line(s) 153,154,131
x9/c.java, line(s) 138,317
y9/b.java, line(s) 44,55
z/c.java, line(s) 63,72
z/e.java, line(s) 633
z/f.java, line(s) 51
z/j.java, line(s) 341,410
z/n.java, line(s) 767,1287,1577,1584,1585,1586,1596,1659,330,915,1372,1379,1492
z0/b.java, line(s) 57,39,78
z3/a.java, line(s) 48,130,147,153,158,56,131,148,154,159
z3/g.java, line(s) 52
z3/j.java, line(s) 45,46
z5/a.java, line(s) 556,593,165,174,502,532,555,592,622,631,507,537
z9/c.java, line(s) 82,87

安全提示信息 此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它

此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard

Files:
h1/m.java, line(s) 4,37

已通过安全项 此应用程序可能具有Root检测功能

此应用程序可能具有Root检测功能
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
n8/e.java, line(s) 925,925,926

已通过安全项 Firebase远程配置已禁用

Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/825719518336/namespaces/firebase:fetch?key=AIzaSyAon8ua0WCQX905ds7XIOC-qqkjtgmSm9E ) 已禁用。响应内容如下所示:

{
    "state": "NO_TEMPLATE"
}

重点安全关注 应用程序可能与位于OFAC制裁国家 (中国) 的服务器 (update.crashlytics.com) 通信。

{'ip': '180.163.151.34', 'country_short': 'CN', 'country_long': '中国', 'region': '上海', 'city': '上海', 'latitude': '31.224333', 'longitude': '121.468948'}

重点安全关注 应用程序可能与位于OFAC制裁国家 (中国) 的服务器 (app-measurement.com) 通信。

{'ip': '180.163.151.166', 'country_short': 'CN', 'country_long': '中国', 'region': '上海', 'city': '上海', 'latitude': '31.224333', 'longitude': '121.468948'}

重点安全关注 应用程序可能与位于OFAC制裁国家 (中国) 的服务器 (pagead2.googlesyndication.com) 通信。

{'ip': '180.163.151.166', 'country_short': 'CN', 'country_long': '中国', 'region': '上海', 'city': '上海', 'latitude': '31.224333', 'longitude': '121.468948'}

综合安全基线评分总结

应用图标

Swift Holidays v3.1

Android APK
51
综合安全评分
中风险