You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jan 12, 2019. It is now read-only.
Once I opened obfuscated classes.dex file from my android project in which I used card.io library, I see 3 classes exposed from io.card.payment package which are:
CardScanner.class
CreditCard.class
DetectionInfo.class
And it's quite obvious to hook & retrieve carddetails from CreditCard class.
I see proguard.cfg file which don't allow us to obfuscate above classes:
-keep class io.card.payment.DetectionInfo
-keepclassmembers class io.card.payment.DetectionInfo {
public *;
}
-keep class io.card.payment.CreditCard
-keepclassmembers class io.card.payment.CreditCard {
*;
}
Has any one thought of obfuscating these classes manually or we are safe of hook detection ?
The text was updated successfully, but these errors were encountered:
navinpd
changed the title
Security threat for non obfuscated code
Security threat for non obfuscated classes
Jul 30, 2018
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
General information
Issue description
Once I opened obfuscated classes.dex file from my android project in which I used card.io library, I see 3 classes exposed from io.card.payment package which are:
And it's quite obvious to hook & retrieve carddetails from CreditCard class.
I see proguard.cfg file which don't allow us to obfuscate above classes:
-keep class io.card.payment.DetectionInfo
-keepclassmembers class io.card.payment.DetectionInfo {
public *;
}
-keep class io.card.payment.CreditCard
-keepclassmembers class io.card.payment.CreditCard {
*;
}
Has any one thought of obfuscating these classes manually or we are safe of hook detection ?
The text was updated successfully, but these errors were encountered: