- Uses AST for threats detection
- Integrates with IntelliJ platform IDEs and supports convenient fix suggestions
- Integrates to CI/CD pipeline
- Easily configurable with XML and Gradle DSL
- Supports different output formats: XML, SARIF, HTML
- Stops the build if critical issues found
- Scans both Java and Kotlin code
Issue | CWE |
---|---|
Hidden Elements | CWE-919: Weaknesses in Mobile Applications |
Incorrect Default Permissions | CWE-276: Incorrect Default Permissions |
Insecure File Operating Mode | CWE-276: Incorrect Default Permissions |
Insufficient Cryptography | CWE-327: Use of a Broken or Risky Cryptographic Algorithm |
Insufficiently Random Values | CWE-330: Use of Insufficiently Random Values |
IP Address Disclosure | CWE-200: Information Exposure |
SQL Injection | CWE-89: SQL Injection |
Insecure WebView Implementation | CWE-749: Exposed Dangerous Method or Function |
Allow Backup Application | N/A |
Android Secret Code Usage | N/A |
Cleartext Traffic Usage | N/A |
Debuggable Application | N/A |
Insecure Application Components | N/A |
Not Protected Application Components | N/A |
Test Only Application | N/A |
- Issue highlight
- Title
- Issue description with CWE link
- Suggested replacement
- Suggested replacement (in action dialogue)
- Ability to ignore the issue