SAST identified vulnerabilities fixable by Quixxi Shield
Note: Only the vulnerabilities that are marked as "Fixable by Quixxi" can be fixed after Quixxi Shield integration (Refer below image)
In order to fix those vulnerabilities, you need to Toggle(on/off) respective shield configurations during app shielding (Configuration screen below)
To eliminate the identified vulnerabilities, please follow the below table:
Note: This reference table helps to point out which security setting to enable for eliminating the vulnerabilities identified by SAST scan.
For Android - APK | ||
S.No | SAST SCAN Vulnerability Identified By Quixxi | Make sure you enable the following option during App Shielding |
1 | Protection of text fields from copying the text and paste outside your app | Disable Copy & Paste Functionality |
2 | Outputting Logs to Logcat / Logging Sensitive Information | Enable to remove logs used in the application |
3 | Certificate Pinning | SSL certification validation / SSL pinning |
4 | Emulator Detection Check | Terminate app when the app is connected to Emulator |
5 | Check for Usage of Native(C, C++) Code | Automatically Fixed by Quixxi |
6 | Is App Debuggable | Automatically Fixed by Quixxi |
7 | Usage of Installer verification code | Automatically Fixed by Quixxi |
8 | Protection of app screens by blurring when the app is running in background | Disable Screenshots & Screen sharing Functionality |
9 | Protection of capturing screenshots & sharing screens outside your app | Disable Screenshots & Screen sharing Functionality |
10 | Executing "root" or System Privilege Check | Terminate app when the app is running in rooted device |
For iOS - iPA | ||
S.No | SAST SCAN Vulnerability Identified By Quixxi | Make sure you enable the following option during App Shielding |
1 | Certificate Pinning check | SSL certificate validation via SSL pinning |
2 | Protect the app from screen sharing | Screen Protection |
3 | Protection of text fields from copy and paste outside your app | Disable Copy & Paste functionality on text fields |
4 | Jailbroken check | Terminate the app running in jailbroken phones |
5 | Unencrypted user defaults | Encrypt App Preferences stored using UserDefaults |
6 | Unencrypted local runtime files | Encrypt files created by the application at runtime |
For any other clarifications, you can always mail to support@quixxi.com
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article