A comprehensive security checklist designed to guide developers through security considerations when designing, testing, and releasing Android applications. The checklist is based on established security frameworks including the OWASP Mobile Application Security Verification Standard and Mobile Application Security Testing Guide. The checklist covers critical security areas including data storage practices, ensuring sensitive data like user credentials and cryptographic keys are properly stored using Android Keystore. It addresses logging security by preventing sensitive data from being written to application logs and restricts unnecessary data sharing with third parties. Platform interaction security is emphasized through validation requirements for all external inputs including UI data, IPC mechanisms, intents, custom URLs, and network streams. The checklist promotes the principle of least privilege by requiring applications to request only the minimum necessary permissions. Additional security measures include disabling keyboard cache for sensitive data inputs, preventing sensitive data exposure through IPC mechanisms and user interfaces, excluding sensitive data from backups, and removing sensitive information from views when applications move to background state. Each checklist item includes links to detailed instructions and recommendations for implementation, making it a practical reference tool for Android developers focused on building secure applications.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A source code search engine for searching alphanumeric snippets, signatures, or keywords in web page HTML, JS, and CSS code.
QIRA is a competitor to strace and gdb with MIT license, supporting Ubuntu and Docker for wider compatibility.
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.
A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.
SearchCode is an extensive code search engine that indexes 75 billion lines of code from millions of projects to help developers find coding examples and libraries.
RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.
A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.