From android reverse engineering to
identifying secrets, broken access
control and API vulnerabilities:
A Mobile APK Vulnerability Chain in a private program:
Client: redacted
Method: Static analysis
Severity: High to critical
Findings: 5
Executive Summary:
This write-up details a multi-stage vulnerabil