- Bug Fixes
- Fixed android 16kb non-complanice parts.
- upgrading permission handler
- upgrading lints
-
RootBeer Integration
- Base root detection using RootBeer library
- Custom enhancements for deeper system checks
- Verification of system partition integrity
-
Frida Protection
- Active process monitoring for Frida-related services
- Detection of Frida libraries and injections
- Runtime protection against Frida hooks
- Process memory scanning for suspicious patterns
-
File System Security
- Scanning for root-related files and directories
- Detection of modified system binaries
- Verification of system partition integrity
- Monitoring of suspicious file permissions
-
Package Analysis
- Detection of known root management apps
- Scanning for superuser applications
- Identification of common root cloaking tools
- Package signature verification
-
Runtime Integrity
- Hook detection in runtime environment
- System property verification
- Native library validation
- Memory tampering detection
-
Emulator Detection
- Hardware characteristics analysis
- Build properties verification
- System image detection
- Performance metrics analysis
-
Development Mode Detection
- USB debugging status monitoring
- Developer options verification
- ADB status checking
- System settings analysis
-
Location Security
- Mock location detection
- GPS spoofing prevention
- Location provider verification
- Coordinate validation
- Runtime permission handling
-
Storage Security
- External storage monitoring
- App installation location verification
- Storage permission analysis
- File system integrity checks
-
Permission Management
// Always check permissions before security checks if (Platform.isAndroid) { final locationStatus = await Permission.location.request(); if (!locationStatus.isGranted) { // Handle permission denied case appropriately return; } }
-
Error Handling
try { final isSecure = await SecurityPlus.isRooted; if (isSecure) { // Implement appropriate security response await handleSecurityBreach(); } } catch (e) { // Always handle exceptions gracefully await logSecurityException(e); }
-
Multiple Verification Layers
- Combine multiple security checks
- Implement time-based verification
- Use progressive security responses
- Maintain security logs
-
Response Strategies
- App termination for critical breaches
- Feature limitation for suspicious activity
- User notification for security concerns
- Secure data wiping when necessary
<manifest>
<uses-permission android:name="android.permission.ACCESS_FINE_LOCATION"/>
<uses-permission android:name="android.permission.ACCESS_COARSE_LOCATION"/>
</manifest><key>NSLocationWhenInUseUsageDescription</key>
<string>Required for security verification</string>Please report security vulnerabilities by opening an issue in the repository. We take all security issues seriously and will respond promptly.
Please include the following information in your report:
- Type of issue
- Full paths of source file(s) related to the manifestation of the issue
- Location of source file(s) in question (tag/branch/commit or direct URL)
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
- Initial Response: Within 24 hours
- Issue Confirmation: Within 72 hours
- Fix Implementation: Timeline varies based on severity
- Public Disclosure: After fix validation and deployment
| Version | Supported | Notes |
|---|---|---|
| 3.0.x | ✅ | Current version with enhanced security |
| 2.0.x | ✅ | Legacy support |
| < 2.0 | ❌ | Deprecated |
We regularly update our security measures to address new threats and vulnerabilities. Stay updated with the latest version to ensure maximum security.