Appshark – Static Taint Analysis Platform To Scan Vulnerabilities In An Android App



After executing the above command, you will see an artifact file AppShark-0.1.1-all.jar in the directory build/libs.

Like the previous step, we assume that you are still in the root folder of the project. You can run the tool with

The config.json5 has the following configuration contents.

Each JSON field is explained below.

If you provide a configuration JSON file which sets the output path as out in the project root directory, you will find the result file out/results.json after running the analysis.

Below is an example of the results.json.

source


CyberTelugu

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top

Adblock Detected

Please consider supporting us by disabling your ad blocker

Refresh Page