DialyDroid Security

dialtechnologies.net

mobile app security audit

10 septembre 2019

Mobile Application Audit Summary

POTENTIAL SECURITY

good

10

warning

33

error

0

INFORMATION APP

APP NAME

Sehatuk صحتك

DEVICE TYPE

Android

APP ID

com.dialy.sehadialy

TEST STARTED

October 3rd 2019, 18:18

APP VERSION

2.3.0

TEST FINISHED

October 3rd 2019, 18:45

Android manifest Analyse Result

The automated audit revealed the following security flaws and weaknesses that may impact the application:

1

Property

Debugging

The application does not generate debugging Messages.

2

Property

backup

The application does not create or restore a copy of its internal data.

3

Property

android.permission.INTERNET

The application asks for a SAFE PERMISSION, this kind of permission is granted automatically and do not violate the user privacy.

4

Property

android.permission.ACCESS_NETWORK_STATE

The application asks for a SAFE PERMISSION, this kind of permission is granted automatically and do not violate the user privacy.

5

Property

com.android.vending.BILLING

The application asks for a SAFE PERMISSION, this kind of permission is granted automatically and do not violate the user privacy.

6

Property

android.permission.WRITE_EXTERNAL_STORAGE

This permission Allows the application to write,modify or delete the contents of the SD card

Impact

Data stored in extrnal storage can be accessed by any application with read access or modified by any application with write access, this may violate data confidentiality and integrity.

Recommandation

it is highly recommended to use internal storag.

Location

AndroidManifest.xml

Screen

<uses-permission xmlns:ns0="http://schemas.android.com/apk/res/android" ns0:maxSdkVersion="22" ns0:name="android.permission.WRITE_EXTERNAL_STORAGE" />
Data storage Analyse Result
1

Property

Log

No log is generated by the application. which reduce data leaking.

2

Property

android:longClickable

The clipboard is disabled in input fields. this practice lower the danger of leaking sensitive data.

3

Property

android:inputType

Keyboard Cache is disabled in input fields. this practice lower the danger of leaking sensitive data.

4

Property

android:inputType

the application does not expose sensitive data (passwords and pins) to the user interface.

Network parameters Analyse Result
1

Property

TLS

The application does not uses TLS secure channel consistely to encrypt data on the network.

Impact

Unsecure network communications lead session hijacking or data interception using man in the middle attacks.

Recommandation

you must consider using TLS for all network connections throughout the application, by using httpsurlconnection.

Location

yallaarabic/source/sources//sources/O00000Oo/O000000o/O000000o/O000000o/O000000o/O00000oO/O000o0.java

Screen

Line 11 : import java.net.HttpURLConnectio;